Correctly pass secrets via environment variables to avoid them being visible in process lists #275
Triggered via pull request
September 30, 2024 14:00
Status
Cancelled
Total duration
37m 56s
Artifacts
–
ci.yml
on: pull_request
Puppet
/
Static validations
16s
Matrix: Puppet / acceptance
Matrix: Puppet / unit
Puppet
/
Test suite
2s
Annotations
208 errors and 1 warning
Puppet / 8 (Ruby 3.2):
spec/unit/puppet/provider/x509_request/openssl_spec.rb#L29
The openssl provider for the x509_request type when not forcing key creates a certificate with the proper options
Failure/Error: openssl options, environment: env
#<Puppet::Type::X509_request::ProviderOpenssl (class)> received :openssl with unexpected arguments
expected: (["req", "-new", "-key", "/tmp/foo.key", "-config", "/tmp/foo.cnf", "-out", "/tmp/foo.csr"])
got: (["req", "-new", "-key", "/tmp/foo.key", "-config", "/tmp/foo.cnf", "-out", "/tmp/foo.csr"], {:environment=>{}})
Diff:
@@ -5,5 +5,6 @@
"-config",
"/tmp/foo.cnf",
"-out",
- "/tmp/foo.csr"]]
+ "/tmp/foo.csr"],
+ {:environment=>{}}]
|
Puppet / 8 (Ruby 3.2):
spec/unit/puppet/provider/x509_request/openssl_spec.rb#L41
The openssl provider for the x509_request type when using password creates a certificate with the proper options
Failure/Error: openssl options, environment: env
#<Puppet::Type::X509_request::ProviderOpenssl (class)> received :openssl with unexpected arguments
expected: (["req", "-new", "-key", "/tmp/foo.key", "-config", "/tmp/foo.cnf", "-out", "/tmp/foo.csr", ["-passin", "pass:2x6${"]])
got: (["req", "-new", "-key", "/tmp/foo.key", "-config", "/tmp/foo.cnf", "-out", "/tmp/foo.csr", ["-passin", "env:CERTIFICATE_PASSIN"]], {:environment=>{"CERTIFICATE_PASSIN"=>"2x6${"}})
Diff:
@@ -6,5 +6,6 @@
"/tmp/foo.cnf",
"-out",
"/tmp/foo.csr",
- ["-passin", "pass:2x6${"]]]
+ ["-passin", "env:CERTIFICATE_PASSIN"]],
+ {:environment=>{"CERTIFICATE_PASSIN"=>"2x6${"}}]
|
Puppet / 8 (Ruby 3.2):
spec/unit/puppet/provider/x509_cert/openssl_spec.rb#L33
The openssl provider for the x509_cert type when not forcing key creates a certificate with the proper options
Failure/Error: openssl options, environment: env
#<Puppet::Type::X509_cert::ProviderOpenssl (class)> received :openssl with unexpected arguments
expected: (["req", "-config", "/tmp/foo.cnf", "-new", "-x509", "-days", 3650, "-key", "/tmp/foo.key", "-out", "/tmp/foo.crt", ["-extensions", "v3_req"]])
got: (["req", "-config", "/tmp/foo.cnf", "-new", "-x509", "-days", 3650, "-key", "/tmp/foo.key", "-out", "/tmp/foo.crt", ["-extensions", "v3_req"]], {:environment=>{}})
|
Puppet / 8 (Ruby 3.2):
spec/unit/puppet/provider/x509_cert/openssl_spec.rb#L48
The openssl provider for the x509_cert type when not forcing key when using password creates a certificate with the proper options
Failure/Error: openssl options, environment: env
#<Puppet::Type::X509_cert::ProviderOpenssl (class)> received :openssl with unexpected arguments
expected: (["req", "-config", "/tmp/foo.cnf", "-new", "-x509", "-days", 3650, "-key", "/tmp/foo.key", "-out", "/tmp/foo.crt", ["-passin", "pass:2x6${"], ["-extensions", "v3_req"]])
got: (["req", "-config", "/tmp/foo.cnf", "-new", "-x509", "-days", 3650, "-key", "/tmp/foo.key", "-out", "/tmp/foo.crt", ["-passin", "env:CERTIFICATE_PASSIN"], ["-extensions", "v3_req"]], {:environment=>{"CERTIFICATE_PASSIN"=>"2x6${"}})
|
Puppet / 8 (Ruby 3.2):
spec/unit/puppet/provider/x509_cert/openssl_spec.rb#L67
The openssl provider for the x509_cert type when using a CA for signing creates a certificate with the proper options
Failure/Error: openssl options, environment: env
#<Puppet::Type::X509_cert::ProviderOpenssl (class)> received :openssl with unexpected arguments
expected: (["x509", "-req", "-days", 3650, "-in", "/tmp/foo.csr", "-out", "/tmp/foo.crt", ["-extfile", "/tmp/foo...reateserial"], ["-CA", "/tmp/foo-ca.crt"], ["-CAkey", "/tmp/foo-ca.key"], ["-extensions", "v3_req"]])
got: (["x509", "-req", "-days", 3650, "-in", "/tmp/foo.csr", "-out", "/tmp/foo.crt", ["-extfile", "/tmp/foo...reateserial"], ["-CA", "/tmp/foo-ca.crt"], ["-CAkey", "/tmp/foo-ca.key"], ["-extensions", "v3_req"]], {:environment=>{}})
|
Puppet / 8 (Ruby 3.2):
spec/unit/puppet/provider/x509_cert/openssl_spec.rb#L88
The openssl provider for the x509_cert type when using a CA for signing with a password creates a certificate with the proper options
Failure/Error: openssl options, environment: env
#<Puppet::Type::X509_cert::ProviderOpenssl (class)> received :openssl with unexpected arguments
expected: (["x509", "-req", "-days", 3650, "-in", "/tmp/foo.csr", "-out", "/tmp/foo.crt", ["-extfile", "/tmp/foo...p/foo-ca.crt"], ["-CAkey", "/tmp/foo-ca.key"], ["-passin", "pass:5i;6%"], ["-extensions", "v3_req"]])
got: (["x509", "-req", "-days", 3650, "-in", "/tmp/foo.csr", "-out", "/tmp/foo.crt", ["-extfile", "/tmp/foo..."], ["-CAkey", "/tmp/foo-ca.key"], ["-passin", "env:CERTIFICATE_PASSIN"], ["-extensions", "v3_req"]], {:environment=>{"CERTIFICATE_PASSIN"=>"5i;6%"}})
|
Puppet / 8 (Ruby 3.2)
Process completed with exit code 1.
|
Puppet / 7 (Ruby 2.7):
spec/unit/puppet/provider/x509_request/openssl_spec.rb#L29
The openssl provider for the x509_request type when not forcing key creates a certificate with the proper options
Failure/Error: openssl options, environment: env
#<Puppet::Type::X509_request::ProviderOpenssl (class)> received :openssl with unexpected arguments
expected: (["req", "-new", "-key", "/tmp/foo.key", "-config", "/tmp/foo.cnf", "-out", "/tmp/foo.csr"])
got: (["req", "-new", "-key", "/tmp/foo.key", "-config", "/tmp/foo.cnf", "-out", "/tmp/foo.csr"], {:environment=>{}})
Diff:
@@ -5,5 +5,6 @@
"-config",
"/tmp/foo.cnf",
"-out",
- "/tmp/foo.csr"]]
+ "/tmp/foo.csr"],
+ {:environment=>{}}]
|
Puppet / 7 (Ruby 2.7):
spec/unit/puppet/provider/x509_request/openssl_spec.rb#L41
The openssl provider for the x509_request type when using password creates a certificate with the proper options
Failure/Error: openssl options, environment: env
#<Puppet::Type::X509_request::ProviderOpenssl (class)> received :openssl with unexpected arguments
expected: (["req", "-new", "-key", "/tmp/foo.key", "-config", "/tmp/foo.cnf", "-out", "/tmp/foo.csr", ["-passin", "pass:2x6${"]])
got: (["req", "-new", "-key", "/tmp/foo.key", "-config", "/tmp/foo.cnf", "-out", "/tmp/foo.csr", ["-passin", "env:CERTIFICATE_PASSIN"]], {:environment=>{"CERTIFICATE_PASSIN"=>"2x6${"}})
Diff:
@@ -6,5 +6,6 @@
"/tmp/foo.cnf",
"-out",
"/tmp/foo.csr",
- ["-passin", "pass:2x6${"]]]
+ ["-passin", "env:CERTIFICATE_PASSIN"]],
+ {:environment=>{"CERTIFICATE_PASSIN"=>"2x6${"}}]
|
Puppet / 7 (Ruby 2.7):
spec/unit/puppet/provider/x509_cert/openssl_spec.rb#L33
The openssl provider for the x509_cert type when not forcing key creates a certificate with the proper options
Failure/Error: openssl options, environment: env
#<Puppet::Type::X509_cert::ProviderOpenssl (class)> received :openssl with unexpected arguments
expected: (["req", "-config", "/tmp/foo.cnf", "-new", "-x509", "-days", 3650, "-key", "/tmp/foo.key", "-out", "/tmp/foo.crt", ["-extensions", "v3_req"]])
got: (["req", "-config", "/tmp/foo.cnf", "-new", "-x509", "-days", 3650, "-key", "/tmp/foo.key", "-out", "/tmp/foo.crt", ["-extensions", "v3_req"]], {:environment=>{}})
|
Puppet / 7 (Ruby 2.7):
spec/unit/puppet/provider/x509_cert/openssl_spec.rb#L48
The openssl provider for the x509_cert type when not forcing key when using password creates a certificate with the proper options
Failure/Error: openssl options, environment: env
#<Puppet::Type::X509_cert::ProviderOpenssl (class)> received :openssl with unexpected arguments
expected: (["req", "-config", "/tmp/foo.cnf", "-new", "-x509", "-days", 3650, "-key", "/tmp/foo.key", "-out", "/tmp/foo.crt", ["-passin", "pass:2x6${"], ["-extensions", "v3_req"]])
got: (["req", "-config", "/tmp/foo.cnf", "-new", "-x509", "-days", 3650, "-key", "/tmp/foo.key", "-out", "/tmp/foo.crt", ["-passin", "env:CERTIFICATE_PASSIN"], ["-extensions", "v3_req"]], {:environment=>{"CERTIFICATE_PASSIN"=>"2x6${"}})
|
Puppet / 7 (Ruby 2.7):
spec/unit/puppet/provider/x509_cert/openssl_spec.rb#L67
The openssl provider for the x509_cert type when using a CA for signing creates a certificate with the proper options
Failure/Error: openssl options, environment: env
#<Puppet::Type::X509_cert::ProviderOpenssl (class)> received :openssl with unexpected arguments
expected: (["x509", "-req", "-days", 3650, "-in", "/tmp/foo.csr", "-out", "/tmp/foo.crt", ["-extfile", "/tmp/foo...reateserial"], ["-CA", "/tmp/foo-ca.crt"], ["-CAkey", "/tmp/foo-ca.key"], ["-extensions", "v3_req"]])
got: (["x509", "-req", "-days", 3650, "-in", "/tmp/foo.csr", "-out", "/tmp/foo.crt", ["-extfile", "/tmp/foo...reateserial"], ["-CA", "/tmp/foo-ca.crt"], ["-CAkey", "/tmp/foo-ca.key"], ["-extensions", "v3_req"]], {:environment=>{}})
|
Puppet / 7 (Ruby 2.7):
spec/unit/puppet/provider/x509_cert/openssl_spec.rb#L88
The openssl provider for the x509_cert type when using a CA for signing with a password creates a certificate with the proper options
Failure/Error: openssl options, environment: env
#<Puppet::Type::X509_cert::ProviderOpenssl (class)> received :openssl with unexpected arguments
expected: (["x509", "-req", "-days", 3650, "-in", "/tmp/foo.csr", "-out", "/tmp/foo.crt", ["-extfile", "/tmp/foo...p/foo-ca.crt"], ["-CAkey", "/tmp/foo-ca.key"], ["-passin", "pass:5i;6%"], ["-extensions", "v3_req"]])
got: (["x509", "-req", "-days", 3650, "-in", "/tmp/foo.csr", "-out", "/tmp/foo.crt", ["-extfile", "/tmp/foo..."], ["-CAkey", "/tmp/foo-ca.key"], ["-passin", "env:CERTIFICATE_PASSIN"], ["-extensions", "v3_req"]], {:environment=>{"CERTIFICATE_PASSIN"=>"5i;6%"}})
|
Puppet / 7 (Ruby 2.7)
Process completed with exit code 1.
|
Puppet / Puppet 8 - Rocky 8:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'rocky8-64-puppet8.example.com' exited with 6 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140236718.iM7r7M.pp
Last 10 lines of output were:
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com]
�[mNotice: Applied catalog in 0.04 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Rocky 8:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'rocky8-64-puppet8.example.com' exited with 4 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140238806.U01k4G.pp
Last 10 lines of output were:
�[mNotice: Compiled catalog for rocky8-64-puppet8.example.com in environment production in 0.06 seconds
Info: Using environment 'production'
Info: Applying configuration version '1727704960'
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
�[mNotice: Applied catalog in 0.02 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Rocky 8:
spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"}
Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) }
expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false
...and:
expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""}
Diff for (have attributes {:owner => "nobody"}):
@@ -1 +1 @@
-:owner => "nobody",
+:owner => "",
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Rocky 8:
spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt"
Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') }
expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Rocky 8:
spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate
Failure/Error: it { is_expected.to be_certificate }
expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Rocky 8:
spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid
Failure/Error: it { is_expected.to be_valid }
expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Rocky 8:
spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/
Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) }
Actual:
Expected:
C = CH, O = Example.com, CN = foo.example.com
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Rocky 8:
spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024
Failure/Error: its(:keylength) { is_expected.to eq 1024 }
expected: 1024
got: 0
(compared using ==)
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Rocky 8
Process completed with exit code 1.
|
Puppet / Puppet 7 - Ubuntu 24.04:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'ubuntu2404-64-puppet7.example.com' exited with 6 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140243280.CW5OZc.pp
Last 10 lines of output were:
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com]
�[mNotice: Applied catalog in 0.05 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Ubuntu 24.04:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'ubuntu2404-64-puppet7.example.com' exited with 4 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140245282.Tj9u2m.pp
Last 10 lines of output were:
�[mNotice: Compiled catalog for ubuntu2404-64-puppet7.example.com in environment production in 0.06 seconds
Info: Using environment 'production'
Info: Applying configuration version '1727704966'
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
�[mNotice: Applied catalog in 0.02 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Ubuntu 24.04:
spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"}
Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) }
expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false
...and:
expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""}
Diff for (have attributes {:owner => "nobody"}):
@@ -1 +1 @@
-:owner => "nobody",
+:owner => "",
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Ubuntu 24.04:
spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt"
Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') }
expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Ubuntu 24.04:
spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate
Failure/Error: it { is_expected.to be_certificate }
expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Ubuntu 24.04:
spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid
Failure/Error: it { is_expected.to be_valid }
expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Ubuntu 24.04:
spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/
Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) }
Actual:
Expected:
C = CH, O = Example.com, CN = foo.example.com
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Ubuntu 24.04:
spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024
Failure/Error: its(:keylength) { is_expected.to eq 1024 }
expected: 1024
got: 0
(compared using ==)
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Ubuntu 24.04
Process completed with exit code 1.
|
Puppet / Puppet 8 - Ubuntu 20.04:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'ubuntu2004-64-puppet8.example.com' exited with 6 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140245154.IEFVNc.pp
Last 10 lines of output were:
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com]
�[mNotice: Applied catalog in 0.04 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Ubuntu 20.04:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'ubuntu2004-64-puppet8.example.com' exited with 4 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140247321.AvBKlw.pp
Last 10 lines of output were:
�[mNotice: Compiled catalog for ubuntu2004-64-puppet8.example.com in environment production in 0.07 seconds
Info: Using environment 'production'
Info: Applying configuration version '1727704969'
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
�[mNotice: Applied catalog in 0.02 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Ubuntu 20.04:
spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"}
Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) }
expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false
...and:
expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""}
Diff for (have attributes {:owner => "nobody"}):
@@ -1 +1 @@
-:owner => "nobody",
+:owner => "",
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Ubuntu 20.04:
spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt"
Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') }
expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Ubuntu 20.04:
spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate
Failure/Error: it { is_expected.to be_certificate }
expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Ubuntu 20.04:
spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid
Failure/Error: it { is_expected.to be_valid }
expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Ubuntu 20.04:
spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/
Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) }
Actual:
Expected:
C = CH, O = Example.com, CN = foo.example.com
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Ubuntu 20.04:
spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024
Failure/Error: its(:keylength) { is_expected.to eq 1024 }
expected: 1024
got: 0
(compared using ==)
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Ubuntu 20.04
Process completed with exit code 1.
|
Puppet / Puppet 8 - CentOS 9:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'centos9-64-puppet8.example.com' exited with 6 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140317063.rZr4dT.pp
Last 10 lines of output were:
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Extra option: "{:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}"
req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Extra option: "{:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}"
req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com]
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
�[mNotice: Applied catalog in 0.04 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - CentOS 9:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'centos9-64-puppet8.example.com' exited with 4 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140319230.sSQEAt.pp
Last 10 lines of output were:
Info: Applying configuration version '1727705001'
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Extra option: "{:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}"
req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Extra option: "{:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}"
req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
�[mNotice: Applied catalog in 0.02 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - CentOS 9:
spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"}
Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) }
expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false
...and:
expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""}
Diff for (have attributes {:owner => "nobody"}):
@@ -1 +1 @@
-:owner => "nobody",
+:owner => "",
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - CentOS 9:
spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt"
Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') }
expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - CentOS 9:
spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate
Failure/Error: it { is_expected.to be_certificate }
expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - CentOS 9:
spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid
Failure/Error: it { is_expected.to be_valid }
expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - CentOS 9:
spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/
Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) }
Actual:
Expected:
C = CH, O = Example.com, CN = foo.example.com
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - CentOS 9:
spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024
Failure/Error: its(:keylength) { is_expected.to eq 1024 }
expected: 1024
got: 0
(compared using ==)
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - CentOS 9
Process completed with exit code 1.
|
Puppet / Puppet 8 - Ubuntu 22.04:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'ubuntu2204-64-puppet8.example.com' exited with 6 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140431712.0V2iBJ.pp
Last 10 lines of output were:
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com]
�[mNotice: Applied catalog in 0.04 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Ubuntu 22.04:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'ubuntu2204-64-puppet8.example.com' exited with 4 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140433784.4o4Jky.pp
Last 10 lines of output were:
�[mNotice: Compiled catalog for ubuntu2204-64-puppet8.example.com in environment production in 0.07 seconds
Info: Using environment 'production'
Info: Applying configuration version '1727705075'
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
�[mNotice: Applied catalog in 0.02 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Ubuntu 22.04:
spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"}
Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) }
expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false
...and:
expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""}
Diff for (have attributes {:owner => "nobody"}):
@@ -1 +1 @@
-:owner => "nobody",
+:owner => "",
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Ubuntu 22.04:
spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt"
Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') }
expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Ubuntu 22.04:
spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate
Failure/Error: it { is_expected.to be_certificate }
expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Ubuntu 22.04:
spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid
Failure/Error: it { is_expected.to be_valid }
expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Ubuntu 22.04:
spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/
Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) }
Actual:
Expected:
C = CH, O = Example.com, CN = foo.example.com
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Ubuntu 22.04:
spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024
Failure/Error: its(:keylength) { is_expected.to eq 1024 }
expected: 1024
got: 0
(compared using ==)
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Ubuntu 22.04
Process completed with exit code 1.
|
Puppet / Puppet 7 - OracleLinux 8:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'oracle8-64-puppet7.example.com' exited with 6 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140442782.MKD70b.pp
Last 10 lines of output were:
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com]
�[mNotice: Applied catalog in 0.06 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - OracleLinux 8:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'oracle8-64-puppet7.example.com' exited with 4 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140444741.f2qXQ7.pp
Last 10 lines of output were:
�[mNotice: Compiled catalog for oracle8-64-puppet7.example.com in environment production in 0.06 seconds
Info: Using environment 'production'
Info: Applying configuration version '1727705086'
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
�[mNotice: Applied catalog in 0.02 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - OracleLinux 8:
spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"}
Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) }
expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false
...and:
expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""}
Diff for (have attributes {:owner => "nobody"}):
@@ -1 +1 @@
-:owner => "nobody",
+:owner => "",
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - OracleLinux 8:
spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt"
Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') }
expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - OracleLinux 8:
spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate
Failure/Error: it { is_expected.to be_certificate }
expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - OracleLinux 8:
spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid
Failure/Error: it { is_expected.to be_valid }
expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - OracleLinux 8:
spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/
Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) }
Actual:
Expected:
C = CH, O = Example.com, CN = foo.example.com
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - OracleLinux 8:
spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024
Failure/Error: its(:keylength) { is_expected.to eq 1024 }
expected: 1024
got: 0
(compared using ==)
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - OracleLinux 8
Process completed with exit code 1.
|
Puppet / Distro Puppet - Archlinux rolling:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'archlinuxrolling-64.example.com' exited with 6 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140517507.bpWl1s.pp
Last 10 lines of output were:
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Extra option: "{:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}"
req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Extra option: "{:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}"
req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com]
�[mNotice: Applied catalog in 0.05 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Distro Puppet - Archlinux rolling:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'archlinuxrolling-64.example.com' exited with 4 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140519527.pobo0d.pp
Last 10 lines of output were:
Info: Applying configuration version '1727705121'
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Extra option: "{:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}"
req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Extra option: "{:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}"
req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
�[mNotice: Applied catalog in 0.02 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Distro Puppet - Archlinux rolling:
spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"}
Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) }
expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false
...and:
expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""}
Diff for (have attributes {:owner => "nobody"}):
@@ -1 +1 @@
-:owner => "nobody",
+:owner => "",
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Distro Puppet - Archlinux rolling:
spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt"
Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') }
expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Distro Puppet - Archlinux rolling:
spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate
Failure/Error: it { is_expected.to be_certificate }
expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Distro Puppet - Archlinux rolling:
spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid
Failure/Error: it { is_expected.to be_valid }
expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Distro Puppet - Archlinux rolling:
spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/
Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) }
Actual:
Expected:
C = CH, O = Example.com, CN = foo.example.com
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Distro Puppet - Archlinux rolling:
spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024
Failure/Error: its(:keylength) { is_expected.to eq 1024 }
expected: 1024
got: 0
(compared using ==)
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Distro Puppet - Archlinux rolling
Process completed with exit code 1.
|
Puppet / Puppet 7 - Ubuntu 20.04:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'ubuntu2004-64-puppet7.example.com' exited with 6 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140851752.JqtQ9m.pp
Last 10 lines of output were:
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com]
�[mNotice: Applied catalog in 0.06 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Ubuntu 20.04:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'ubuntu2004-64-puppet7.example.com' exited with 4 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140853758.Z63gxF.pp
Last 10 lines of output were:
�[mNotice: Compiled catalog for ubuntu2004-64-puppet7.example.com in environment production in 0.06 seconds
Info: Using environment 'production'
Info: Applying configuration version '1727705335'
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
�[mNotice: Applied catalog in 0.02 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Ubuntu 20.04:
spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"}
Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) }
expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false
...and:
expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""}
Diff for (have attributes {:owner => "nobody"}):
@@ -1 +1 @@
-:owner => "nobody",
+:owner => "",
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Ubuntu 20.04:
spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt"
Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') }
expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Ubuntu 20.04:
spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate
Failure/Error: it { is_expected.to be_certificate }
expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Ubuntu 20.04:
spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid
Failure/Error: it { is_expected.to be_valid }
expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Ubuntu 20.04:
spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/
Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) }
Actual:
Expected:
C = CH, O = Example.com, CN = foo.example.com
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Ubuntu 20.04:
spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024
Failure/Error: its(:keylength) { is_expected.to eq 1024 }
expected: 1024
got: 0
(compared using ==)
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Ubuntu 20.04
Process completed with exit code 1.
|
Puppet / Puppet 8 - AlmaLinux 9:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'almalinux9-64-puppet8.example.com' exited with 6 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140939913.2XMtaK.pp
Last 10 lines of output were:
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com]
�[mNotice: Applied catalog in 0.05 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - AlmaLinux 9:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'almalinux9-64-puppet8.example.com' exited with 4 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140941992.AuBKBQ.pp
Last 10 lines of output were:
�[mNotice: Compiled catalog for almalinux9-64-puppet8.example.com in environment production in 0.06 seconds
Info: Using environment 'production'
Info: Applying configuration version '1727705383'
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
�[mNotice: Applied catalog in 0.02 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - AlmaLinux 9:
spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"}
Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) }
expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false
...and:
expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""}
Diff for (have attributes {:owner => "nobody"}):
@@ -1 +1 @@
-:owner => "nobody",
+:owner => "",
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - AlmaLinux 9:
spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt"
Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') }
expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - AlmaLinux 9:
spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate
Failure/Error: it { is_expected.to be_certificate }
expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - AlmaLinux 9:
spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid
Failure/Error: it { is_expected.to be_valid }
expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - AlmaLinux 9:
spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/
Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) }
Actual:
Expected:
C = CH, O = Example.com, CN = foo.example.com
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - AlmaLinux 9:
spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024
Failure/Error: its(:keylength) { is_expected.to eq 1024 }
expected: 1024
got: 0
(compared using ==)
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - AlmaLinux 9
Process completed with exit code 1.
|
Puppet / Puppet 8 - OracleLinux 8:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'oracle8-64-puppet8.example.com' exited with 6 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141014254.ahMIv3.pp
Last 10 lines of output were:
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com]
�[mNotice: Applied catalog in 0.04 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - OracleLinux 8:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'oracle8-64-puppet8.example.com' exited with 4 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141016452.TG0qJo.pp
Last 10 lines of output were:
�[mNotice: Compiled catalog for oracle8-64-puppet8.example.com in environment production in 0.07 seconds
Info: Using environment 'production'
Info: Applying configuration version '1727705418'
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
�[mNotice: Applied catalog in 0.02 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - OracleLinux 8:
spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"}
Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) }
expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false
...and:
expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""}
Diff for (have attributes {:owner => "nobody"}):
@@ -1 +1 @@
-:owner => "nobody",
+:owner => "",
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - OracleLinux 8:
spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt"
Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') }
expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - OracleLinux 8:
spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate
Failure/Error: it { is_expected.to be_certificate }
expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - OracleLinux 8:
spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid
Failure/Error: it { is_expected.to be_valid }
expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - OracleLinux 8:
spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/
Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) }
Actual:
Expected:
C = CH, O = Example.com, CN = foo.example.com
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - OracleLinux 8:
spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024
Failure/Error: its(:keylength) { is_expected.to eq 1024 }
expected: 1024
got: 0
(compared using ==)
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - OracleLinux 8
Process completed with exit code 1.
|
Puppet / Puppet 7 - Ubuntu 22.04:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'ubuntu2204-64-puppet7.example.com' exited with 6 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141055258.ktpVpU.pp
Last 10 lines of output were:
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com]
�[mNotice: Applied catalog in 0.04 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Ubuntu 22.04:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'ubuntu2204-64-puppet7.example.com' exited with 4 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141057218.AjXVCq.pp
Last 10 lines of output were:
�[mNotice: Compiled catalog for ubuntu2204-64-puppet7.example.com in environment production in 0.06 seconds
Info: Using environment 'production'
Info: Applying configuration version '1727705458'
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
�[mNotice: Applied catalog in 0.02 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Ubuntu 22.04:
spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"}
Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) }
expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false
...and:
expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""}
Diff for (have attributes {:owner => "nobody"}):
@@ -1 +1 @@
-:owner => "nobody",
+:owner => "",
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Ubuntu 22.04:
spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt"
Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') }
expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Ubuntu 22.04:
spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate
Failure/Error: it { is_expected.to be_certificate }
expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Ubuntu 22.04:
spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid
Failure/Error: it { is_expected.to be_valid }
expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Ubuntu 22.04:
spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/
Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) }
Actual:
Expected:
C = CH, O = Example.com, CN = foo.example.com
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Ubuntu 22.04:
spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024
Failure/Error: its(:keylength) { is_expected.to eq 1024 }
expected: 1024
got: 0
(compared using ==)
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Ubuntu 22.04
Process completed with exit code 1.
|
Puppet / Puppet 8 - Ubuntu 24.04:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'ubuntu2404-64-puppet8.example.com' exited with 6 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141120377.WHWsnt.pp
Last 10 lines of output were:
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com]
�[mNotice: Applied catalog in 0.04 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Ubuntu 24.04:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'ubuntu2404-64-puppet8.example.com' exited with 4 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141122511.kPj2kZ.pp
Last 10 lines of output were:
�[mNotice: Compiled catalog for ubuntu2404-64-puppet8.example.com in environment production in 0.07 seconds
Info: Using environment 'production'
Info: Applying configuration version '1727705484'
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
�[mNotice: Applied catalog in 0.02 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Ubuntu 24.04:
spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"}
Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) }
expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false
...and:
expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""}
Diff for (have attributes {:owner => "nobody"}):
@@ -1 +1 @@
-:owner => "nobody",
+:owner => "",
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Ubuntu 24.04:
spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt"
Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') }
expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Ubuntu 24.04:
spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate
Failure/Error: it { is_expected.to be_certificate }
expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Ubuntu 24.04:
spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid
Failure/Error: it { is_expected.to be_valid }
expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Ubuntu 24.04:
spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/
Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) }
Actual:
Expected:
C = CH, O = Example.com, CN = foo.example.com
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Ubuntu 24.04:
spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024
Failure/Error: its(:keylength) { is_expected.to eq 1024 }
expected: 1024
got: 0
(compared using ==)
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Ubuntu 24.04
Process completed with exit code 1.
|
Puppet / Puppet 7 - Rocky 8:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'rocky8-64-puppet7.example.com' exited with 6 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141227323.QaJ34X.pp
Last 10 lines of output were:
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com]
�[mNotice: Applied catalog in 0.05 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Rocky 8:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'rocky8-64-puppet7.example.com' exited with 4 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141229228.rTfR5O.pp
Last 10 lines of output were:
�[mNotice: Compiled catalog for rocky8-64-puppet7.example.com in environment production in 0.06 seconds
Info: Using environment 'production'
Info: Applying configuration version '1727705550'
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
�[mNotice: Applied catalog in 0.02 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Rocky 8:
spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"}
Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) }
expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false
...and:
expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""}
Diff for (have attributes {:owner => "nobody"}):
@@ -1 +1 @@
-:owner => "nobody",
+:owner => "",
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Rocky 8:
spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt"
Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') }
expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Rocky 8:
spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate
Failure/Error: it { is_expected.to be_certificate }
expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Rocky 8:
spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid
Failure/Error: it { is_expected.to be_valid }
expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Rocky 8:
spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/
Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) }
Actual:
Expected:
C = CH, O = Example.com, CN = foo.example.com
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Rocky 8:
spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024
Failure/Error: its(:keylength) { is_expected.to eq 1024 }
expected: 1024
got: 0
(compared using ==)
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Rocky 8
Process completed with exit code 1.
|
Puppet / Puppet 8 - Rocky 9:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'rocky9-64-puppet8.example.com' exited with 6 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141245376.RlXnFQ.pp
Last 10 lines of output were:
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com]
�[mNotice: Applied catalog in 0.04 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Rocky 9:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'rocky9-64-puppet8.example.com' exited with 4 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141247624.U2K0gm.pp
Last 10 lines of output were:
�[mNotice: Compiled catalog for rocky9-64-puppet8.example.com in environment production in 0.07 seconds
Info: Using environment 'production'
Info: Applying configuration version '1727705569'
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
�[mNotice: Applied catalog in 0.02 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Rocky 9:
spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"}
Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) }
expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false
...and:
expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""}
Diff for (have attributes {:owner => "nobody"}):
@@ -1 +1 @@
-:owner => "nobody",
+:owner => "",
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Rocky 9:
spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt"
Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') }
expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Rocky 9:
spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate
Failure/Error: it { is_expected.to be_certificate }
expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Rocky 9:
spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid
Failure/Error: it { is_expected.to be_valid }
expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Rocky 9:
spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/
Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) }
Actual:
Expected:
C = CH, O = Example.com, CN = foo.example.com
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Rocky 9:
spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024
Failure/Error: its(:keylength) { is_expected.to eq 1024 }
expected: 1024
got: 0
(compared using ==)
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Rocky 9
Process completed with exit code 1.
|
Puppet / Puppet 7 - OracleLinux 9:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'oracle9-64-puppet7.example.com' exited with 6 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141421228.FkIy0j.pp
Last 10 lines of output were:
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com]
�[mNotice: Applied catalog in 0.06 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - OracleLinux 9:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'oracle9-64-puppet7.example.com' exited with 4 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141423313.szcpwf.pp
Last 10 lines of output were:
�[mNotice: Compiled catalog for oracle9-64-puppet7.example.com in environment production in 0.06 seconds
Info: Using environment 'production'
Info: Applying configuration version '1727705665'
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
�[mNotice: Applied catalog in 0.02 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - OracleLinux 9:
spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"}
Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) }
expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false
...and:
expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""}
Diff for (have attributes {:owner => "nobody"}):
@@ -1 +1 @@
-:owner => "nobody",
+:owner => "",
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - OracleLinux 9:
spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt"
Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') }
expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - OracleLinux 9:
spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate
Failure/Error: it { is_expected.to be_certificate }
expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - OracleLinux 9:
spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid
Failure/Error: it { is_expected.to be_valid }
expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - OracleLinux 9:
spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/
Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) }
Actual:
Expected:
C = CH, O = Example.com, CN = foo.example.com
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - OracleLinux 9:
spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024
Failure/Error: its(:keylength) { is_expected.to eq 1024 }
expected: 1024
got: 0
(compared using ==)
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - OracleLinux 9
Process completed with exit code 1.
|
Puppet / Puppet 7 - CentOS 9:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'centos9-64-puppet7.example.com' exited with 6 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141427798.s9d51K.pp
Last 10 lines of output were:
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Extra option: "{:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}"
req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Extra option: "{:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}"
req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com]
�[mNotice: Applied catalog in 0.05 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - CentOS 9:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'centos9-64-puppet7.example.com' exited with 4 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141429825.qkaFcr.pp
Last 10 lines of output were:
Info: Applying configuration version '1727705671'
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Extra option: "{:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}"
req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Extra option: "{:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}"
req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
�[mNotice: Applied catalog in 0.02 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - CentOS 9:
spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"}
Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) }
expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false
...and:
expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""}
Diff for (have attributes {:owner => "nobody"}):
@@ -1 +1 @@
-:owner => "nobody",
+:owner => "",
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - CentOS 9:
spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt"
Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') }
expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - CentOS 9:
spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate
Failure/Error: it { is_expected.to be_certificate }
expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - CentOS 9:
spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid
Failure/Error: it { is_expected.to be_valid }
expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - CentOS 9:
spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/
Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) }
Actual:
Expected:
C = CH, O = Example.com, CN = foo.example.com
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - CentOS 9:
spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024
Failure/Error: its(:keylength) { is_expected.to eq 1024 }
expected: 1024
got: 0
(compared using ==)
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - CentOS 9
Process completed with exit code 1.
|
Puppet / Puppet 8 - Debian 12:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'debian12-64-puppet8.example.com' exited with 6 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141447155.0BHDW9.pp
Last 10 lines of output were:
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com]
�[mNotice: Applied catalog in 0.04 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Debian 12:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'debian12-64-puppet8.example.com' exited with 4 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141449199.Ox2C95.pp
Last 10 lines of output were:
�[mNotice: Compiled catalog for debian12-64-puppet8.example.com in environment production in 0.07 seconds
Info: Using environment 'production'
Info: Applying configuration version '1727705690'
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
�[mNotice: Applied catalog in 0.02 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Debian 12:
spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"}
Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) }
expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false
...and:
expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""}
Diff for (have attributes {:owner => "nobody"}):
@@ -1 +1 @@
-:owner => "nobody",
+:owner => "",
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Debian 12:
spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt"
Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') }
expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Debian 12:
spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate
Failure/Error: it { is_expected.to be_certificate }
expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Debian 12:
spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid
Failure/Error: it { is_expected.to be_valid }
expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Debian 12:
spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/
Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) }
Actual:
Expected:
C = CH, O = Example.com, CN = foo.example.com
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Debian 12:
spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024
Failure/Error: its(:keylength) { is_expected.to eq 1024 }
expected: 1024
got: 0
(compared using ==)
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - Debian 12
Process completed with exit code 1.
|
Puppet / Puppet 8 - AlmaLinux 8:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'almalinux8-64-puppet8.example.com' exited with 6 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141533635.OUl1x7.pp
Last 10 lines of output were:
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com]
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
�[mNotice: Applied catalog in 0.04 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - AlmaLinux 8:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'almalinux8-64-puppet8.example.com' exited with 4 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141535731.Wn9CHJ.pp
Last 10 lines of output were:
�[mNotice: Compiled catalog for almalinux8-64-puppet8.example.com in environment production in 0.06 seconds
Info: Using environment 'production'
Info: Applying configuration version '1727705737'
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
�[mNotice: Applied catalog in 0.02 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - AlmaLinux 8:
spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"}
Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) }
expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false
...and:
expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""}
Diff for (have attributes {:owner => "nobody"}):
@@ -1 +1 @@
-:owner => "nobody",
+:owner => "",
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - AlmaLinux 8:
spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt"
Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') }
expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - AlmaLinux 8:
spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate
Failure/Error: it { is_expected.to be_certificate }
expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - AlmaLinux 8:
spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid
Failure/Error: it { is_expected.to be_valid }
expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - AlmaLinux 8:
spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/
Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) }
Actual:
Expected:
C = CH, O = Example.com, CN = foo.example.com
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - AlmaLinux 8:
spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024
Failure/Error: its(:keylength) { is_expected.to eq 1024 }
expected: 1024
got: 0
(compared using ==)
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - AlmaLinux 8
Process completed with exit code 1.
|
Puppet / Puppet 7 - AlmaLinux 8:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'almalinux8-64-puppet7.example.com' exited with 6 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141653797.5kCUtK.pp
Last 10 lines of output were:
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com]
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
�[mNotice: Applied catalog in 0.05 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - AlmaLinux 8:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'almalinux8-64-puppet7.example.com' exited with 4 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141655785.ljvZfx.pp
Last 10 lines of output were:
�[mNotice: Compiled catalog for almalinux8-64-puppet7.example.com in environment production in 0.06 seconds
Info: Using environment 'production'
Info: Applying configuration version '1727705817'
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
�[mNotice: Applied catalog in 0.02 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - AlmaLinux 8:
spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"}
Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) }
expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false
...and:
expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""}
Diff for (have attributes {:owner => "nobody"}):
@@ -1 +1 @@
-:owner => "nobody",
+:owner => "",
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - AlmaLinux 8:
spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt"
Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') }
expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - AlmaLinux 8:
spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate
Failure/Error: it { is_expected.to be_certificate }
expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - AlmaLinux 8:
spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid
Failure/Error: it { is_expected.to be_valid }
expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - AlmaLinux 8:
spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/
Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) }
Actual:
Expected:
C = CH, O = Example.com, CN = foo.example.com
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - AlmaLinux 8:
spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024
Failure/Error: its(:keylength) { is_expected.to eq 1024 }
expected: 1024
got: 0
(compared using ==)
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - AlmaLinux 8
Process completed with exit code 1.
|
Puppet / Puppet 7 - Debian 12:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'debian12-64-puppet7.example.com' exited with 6 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_142447180.1dEvm1.pp
Last 10 lines of output were:
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com]
�[mNotice: Applied catalog in 0.05 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Debian 12:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'debian12-64-puppet7.example.com' exited with 4 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_142449139.UHbHgs.pp
Last 10 lines of output were:
�[mNotice: Compiled catalog for debian12-64-puppet7.example.com in environment production in 0.06 seconds
Info: Using environment 'production'
Info: Applying configuration version '1727706290'
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
�[mNotice: Applied catalog in 0.02 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Debian 12:
spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"}
Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) }
expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false
...and:
expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""}
Diff for (have attributes {:owner => "nobody"}):
@@ -1 +1 @@
-:owner => "nobody",
+:owner => "",
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Debian 12:
spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt"
Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') }
expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Debian 12:
spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate
Failure/Error: it { is_expected.to be_certificate }
expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Debian 12:
spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid
Failure/Error: it { is_expected.to be_valid }
expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Debian 12:
spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/
Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) }
Actual:
Expected:
C = CH, O = Example.com, CN = foo.example.com
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Debian 12:
spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024
Failure/Error: its(:keylength) { is_expected.to eq 1024 }
expected: 1024
got: 0
(compared using ==)
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 7 - Debian 12
Process completed with exit code 1.
|
Puppet / Puppet 8 - OracleLinux 9:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'oracle9-64-puppet8.example.com' exited with 6 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_143214880.Qnhp3j.pp
Last 10 lines of output were:
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com]
�[mNotice: Applied catalog in 0.04 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - OracleLinux 9:
vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes
Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}"
Beaker::Host::CommandFailure:
Host 'oracle9-64-puppet8.example.com' exited with 4 running:
puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_143217016.OAkPyA.pp
Last 10 lines of output were:
�[mNotice: Compiled catalog for oracle9-64-puppet8.example.com in environment production in 0.06 seconds
Info: Using environment 'production'
Info: Applying configuration version '1727706738'
Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary.
�[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies
Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies
�[mNotice: Applied catalog in 0.02 seconds
Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - OracleLinux 9:
spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"}
Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) }
expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false
...and:
expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""}
Diff for (have attributes {:owner => "nobody"}):
@@ -1 +1 @@
-:owner => "nobody",
+:owner => "",
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - OracleLinux 9:
spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt"
Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') }
expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - OracleLinux 9:
spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate
Failure/Error: it { is_expected.to be_certificate }
expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - OracleLinux 9:
spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid
Failure/Error: it { is_expected.to be_valid }
expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - OracleLinux 9:
spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/
Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) }
Actual:
Expected:
C = CH, O = Example.com, CN = foo.example.com
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - OracleLinux 9:
spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024
Failure/Error: its(:keylength) { is_expected.to eq 1024 }
expected: 1024
got: 0
(compared using ==)
Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
|
Puppet / Puppet 8 - OracleLinux 9
Process completed with exit code 1.
|
Puppet / Puppet 7 - Rocky 9
Canceling since a higher priority waiting request for '228/merge' exists
|
Puppet / Puppet 7 - Rocky 9
The operation was canceled.
|
Puppet / Puppet 7 - AlmaLinux 9
Canceling since a higher priority waiting request for '228/merge' exists
|
Puppet / Puppet 7 - AlmaLinux 9
The operation was canceled.
|
Puppet / Test suite
Process completed with exit code 1.
|
Puppet / Static validations:
metadata.json#L1
Skipping EOL operating system Debian 11
|