Skip to content

Correctly pass secrets via environment variables to avoid them being visible in process lists #275

Correctly pass secrets via environment variables to avoid them being visible in process lists

Correctly pass secrets via environment variables to avoid them being visible in process lists #275

Triggered via pull request September 30, 2024 14:00
Status Cancelled
Total duration 37m 56s
Artifacts

ci.yml

on: pull_request
Puppet  /  Static validations
16s
Puppet / Static validations
Matrix: Puppet / acceptance
Matrix: Puppet / unit
Puppet  /  Test suite
2s
Puppet / Test suite
Fit to window
Zoom out
Zoom in

Annotations

208 errors and 1 warning
Puppet / 8 (Ruby 3.2): spec/unit/puppet/provider/x509_request/openssl_spec.rb#L29
The openssl provider for the x509_request type when not forcing key creates a certificate with the proper options Failure/Error: openssl options, environment: env #<Puppet::Type::X509_request::ProviderOpenssl (class)> received :openssl with unexpected arguments expected: (["req", "-new", "-key", "/tmp/foo.key", "-config", "/tmp/foo.cnf", "-out", "/tmp/foo.csr"]) got: (["req", "-new", "-key", "/tmp/foo.key", "-config", "/tmp/foo.cnf", "-out", "/tmp/foo.csr"], {:environment=>{}}) Diff: @@ -5,5 +5,6 @@ "-config", "/tmp/foo.cnf", "-out", - "/tmp/foo.csr"]] + "/tmp/foo.csr"], + {:environment=>{}}]
Puppet / 8 (Ruby 3.2): spec/unit/puppet/provider/x509_request/openssl_spec.rb#L41
The openssl provider for the x509_request type when using password creates a certificate with the proper options Failure/Error: openssl options, environment: env #<Puppet::Type::X509_request::ProviderOpenssl (class)> received :openssl with unexpected arguments expected: (["req", "-new", "-key", "/tmp/foo.key", "-config", "/tmp/foo.cnf", "-out", "/tmp/foo.csr", ["-passin", "pass:2x6${"]]) got: (["req", "-new", "-key", "/tmp/foo.key", "-config", "/tmp/foo.cnf", "-out", "/tmp/foo.csr", ["-passin", "env:CERTIFICATE_PASSIN"]], {:environment=>{"CERTIFICATE_PASSIN"=>"2x6${"}}) Diff: @@ -6,5 +6,6 @@ "/tmp/foo.cnf", "-out", "/tmp/foo.csr", - ["-passin", "pass:2x6${"]]] + ["-passin", "env:CERTIFICATE_PASSIN"]], + {:environment=>{"CERTIFICATE_PASSIN"=>"2x6${"}}]
Puppet / 8 (Ruby 3.2): spec/unit/puppet/provider/x509_cert/openssl_spec.rb#L33
The openssl provider for the x509_cert type when not forcing key creates a certificate with the proper options Failure/Error: openssl options, environment: env #<Puppet::Type::X509_cert::ProviderOpenssl (class)> received :openssl with unexpected arguments expected: (["req", "-config", "/tmp/foo.cnf", "-new", "-x509", "-days", 3650, "-key", "/tmp/foo.key", "-out", "/tmp/foo.crt", ["-extensions", "v3_req"]]) got: (["req", "-config", "/tmp/foo.cnf", "-new", "-x509", "-days", 3650, "-key", "/tmp/foo.key", "-out", "/tmp/foo.crt", ["-extensions", "v3_req"]], {:environment=>{}})
Puppet / 8 (Ruby 3.2): spec/unit/puppet/provider/x509_cert/openssl_spec.rb#L48
The openssl provider for the x509_cert type when not forcing key when using password creates a certificate with the proper options Failure/Error: openssl options, environment: env #<Puppet::Type::X509_cert::ProviderOpenssl (class)> received :openssl with unexpected arguments expected: (["req", "-config", "/tmp/foo.cnf", "-new", "-x509", "-days", 3650, "-key", "/tmp/foo.key", "-out", "/tmp/foo.crt", ["-passin", "pass:2x6${"], ["-extensions", "v3_req"]]) got: (["req", "-config", "/tmp/foo.cnf", "-new", "-x509", "-days", 3650, "-key", "/tmp/foo.key", "-out", "/tmp/foo.crt", ["-passin", "env:CERTIFICATE_PASSIN"], ["-extensions", "v3_req"]], {:environment=>{"CERTIFICATE_PASSIN"=>"2x6${"}})
Puppet / 8 (Ruby 3.2): spec/unit/puppet/provider/x509_cert/openssl_spec.rb#L67
The openssl provider for the x509_cert type when using a CA for signing creates a certificate with the proper options Failure/Error: openssl options, environment: env #<Puppet::Type::X509_cert::ProviderOpenssl (class)> received :openssl with unexpected arguments expected: (["x509", "-req", "-days", 3650, "-in", "/tmp/foo.csr", "-out", "/tmp/foo.crt", ["-extfile", "/tmp/foo...reateserial"], ["-CA", "/tmp/foo-ca.crt"], ["-CAkey", "/tmp/foo-ca.key"], ["-extensions", "v3_req"]]) got: (["x509", "-req", "-days", 3650, "-in", "/tmp/foo.csr", "-out", "/tmp/foo.crt", ["-extfile", "/tmp/foo...reateserial"], ["-CA", "/tmp/foo-ca.crt"], ["-CAkey", "/tmp/foo-ca.key"], ["-extensions", "v3_req"]], {:environment=>{}})
Puppet / 8 (Ruby 3.2): spec/unit/puppet/provider/x509_cert/openssl_spec.rb#L88
The openssl provider for the x509_cert type when using a CA for signing with a password creates a certificate with the proper options Failure/Error: openssl options, environment: env #<Puppet::Type::X509_cert::ProviderOpenssl (class)> received :openssl with unexpected arguments expected: (["x509", "-req", "-days", 3650, "-in", "/tmp/foo.csr", "-out", "/tmp/foo.crt", ["-extfile", "/tmp/foo...p/foo-ca.crt"], ["-CAkey", "/tmp/foo-ca.key"], ["-passin", "pass:5i;6%"], ["-extensions", "v3_req"]]) got: (["x509", "-req", "-days", 3650, "-in", "/tmp/foo.csr", "-out", "/tmp/foo.crt", ["-extfile", "/tmp/foo..."], ["-CAkey", "/tmp/foo-ca.key"], ["-passin", "env:CERTIFICATE_PASSIN"], ["-extensions", "v3_req"]], {:environment=>{"CERTIFICATE_PASSIN"=>"5i;6%"}})
Puppet / 8 (Ruby 3.2)
Process completed with exit code 1.
Puppet / 7 (Ruby 2.7): spec/unit/puppet/provider/x509_request/openssl_spec.rb#L29
The openssl provider for the x509_request type when not forcing key creates a certificate with the proper options Failure/Error: openssl options, environment: env #<Puppet::Type::X509_request::ProviderOpenssl (class)> received :openssl with unexpected arguments expected: (["req", "-new", "-key", "/tmp/foo.key", "-config", "/tmp/foo.cnf", "-out", "/tmp/foo.csr"]) got: (["req", "-new", "-key", "/tmp/foo.key", "-config", "/tmp/foo.cnf", "-out", "/tmp/foo.csr"], {:environment=>{}}) Diff: @@ -5,5 +5,6 @@ "-config", "/tmp/foo.cnf", "-out", - "/tmp/foo.csr"]] + "/tmp/foo.csr"], + {:environment=>{}}]
Puppet / 7 (Ruby 2.7): spec/unit/puppet/provider/x509_request/openssl_spec.rb#L41
The openssl provider for the x509_request type when using password creates a certificate with the proper options Failure/Error: openssl options, environment: env #<Puppet::Type::X509_request::ProviderOpenssl (class)> received :openssl with unexpected arguments expected: (["req", "-new", "-key", "/tmp/foo.key", "-config", "/tmp/foo.cnf", "-out", "/tmp/foo.csr", ["-passin", "pass:2x6${"]]) got: (["req", "-new", "-key", "/tmp/foo.key", "-config", "/tmp/foo.cnf", "-out", "/tmp/foo.csr", ["-passin", "env:CERTIFICATE_PASSIN"]], {:environment=>{"CERTIFICATE_PASSIN"=>"2x6${"}}) Diff: @@ -6,5 +6,6 @@ "/tmp/foo.cnf", "-out", "/tmp/foo.csr", - ["-passin", "pass:2x6${"]]] + ["-passin", "env:CERTIFICATE_PASSIN"]], + {:environment=>{"CERTIFICATE_PASSIN"=>"2x6${"}}]
Puppet / 7 (Ruby 2.7): spec/unit/puppet/provider/x509_cert/openssl_spec.rb#L33
The openssl provider for the x509_cert type when not forcing key creates a certificate with the proper options Failure/Error: openssl options, environment: env #<Puppet::Type::X509_cert::ProviderOpenssl (class)> received :openssl with unexpected arguments expected: (["req", "-config", "/tmp/foo.cnf", "-new", "-x509", "-days", 3650, "-key", "/tmp/foo.key", "-out", "/tmp/foo.crt", ["-extensions", "v3_req"]]) got: (["req", "-config", "/tmp/foo.cnf", "-new", "-x509", "-days", 3650, "-key", "/tmp/foo.key", "-out", "/tmp/foo.crt", ["-extensions", "v3_req"]], {:environment=>{}})
Puppet / 7 (Ruby 2.7): spec/unit/puppet/provider/x509_cert/openssl_spec.rb#L48
The openssl provider for the x509_cert type when not forcing key when using password creates a certificate with the proper options Failure/Error: openssl options, environment: env #<Puppet::Type::X509_cert::ProviderOpenssl (class)> received :openssl with unexpected arguments expected: (["req", "-config", "/tmp/foo.cnf", "-new", "-x509", "-days", 3650, "-key", "/tmp/foo.key", "-out", "/tmp/foo.crt", ["-passin", "pass:2x6${"], ["-extensions", "v3_req"]]) got: (["req", "-config", "/tmp/foo.cnf", "-new", "-x509", "-days", 3650, "-key", "/tmp/foo.key", "-out", "/tmp/foo.crt", ["-passin", "env:CERTIFICATE_PASSIN"], ["-extensions", "v3_req"]], {:environment=>{"CERTIFICATE_PASSIN"=>"2x6${"}})
Puppet / 7 (Ruby 2.7): spec/unit/puppet/provider/x509_cert/openssl_spec.rb#L67
The openssl provider for the x509_cert type when using a CA for signing creates a certificate with the proper options Failure/Error: openssl options, environment: env #<Puppet::Type::X509_cert::ProviderOpenssl (class)> received :openssl with unexpected arguments expected: (["x509", "-req", "-days", 3650, "-in", "/tmp/foo.csr", "-out", "/tmp/foo.crt", ["-extfile", "/tmp/foo...reateserial"], ["-CA", "/tmp/foo-ca.crt"], ["-CAkey", "/tmp/foo-ca.key"], ["-extensions", "v3_req"]]) got: (["x509", "-req", "-days", 3650, "-in", "/tmp/foo.csr", "-out", "/tmp/foo.crt", ["-extfile", "/tmp/foo...reateserial"], ["-CA", "/tmp/foo-ca.crt"], ["-CAkey", "/tmp/foo-ca.key"], ["-extensions", "v3_req"]], {:environment=>{}})
Puppet / 7 (Ruby 2.7): spec/unit/puppet/provider/x509_cert/openssl_spec.rb#L88
The openssl provider for the x509_cert type when using a CA for signing with a password creates a certificate with the proper options Failure/Error: openssl options, environment: env #<Puppet::Type::X509_cert::ProviderOpenssl (class)> received :openssl with unexpected arguments expected: (["x509", "-req", "-days", 3650, "-in", "/tmp/foo.csr", "-out", "/tmp/foo.crt", ["-extfile", "/tmp/foo...p/foo-ca.crt"], ["-CAkey", "/tmp/foo-ca.key"], ["-passin", "pass:5i;6%"], ["-extensions", "v3_req"]]) got: (["x509", "-req", "-days", 3650, "-in", "/tmp/foo.csr", "-out", "/tmp/foo.crt", ["-extfile", "/tmp/foo..."], ["-CAkey", "/tmp/foo-ca.key"], ["-passin", "env:CERTIFICATE_PASSIN"], ["-extensions", "v3_req"]], {:environment=>{"CERTIFICATE_PASSIN"=>"5i;6%"}})
Puppet / 7 (Ruby 2.7)
Process completed with exit code 1.
Puppet / Puppet 8 - Rocky 8: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'rocky8-64-puppet8.example.com' exited with 6 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140236718.iM7r7M.pp Last 10 lines of output were: Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com] �[mNotice: Applied catalog in 0.04 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Rocky 8: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'rocky8-64-puppet8.example.com' exited with 4 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140238806.U01k4G.pp Last 10 lines of output were: �[mNotice: Compiled catalog for rocky8-64-puppet8.example.com in environment production in 0.06 seconds Info: Using environment 'production' Info: Applying configuration version '1727704960' Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies �[mNotice: Applied catalog in 0.02 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Rocky 8: spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"} Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) } expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false ...and: expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""} Diff for (have attributes {:owner => "nobody"}): @@ -1 +1 @@ -:owner => "nobody", +:owner => "", Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Rocky 8: spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt" Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') } expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Rocky 8: spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate Failure/Error: it { is_expected.to be_certificate } expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Rocky 8: spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid Failure/Error: it { is_expected.to be_valid } expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Rocky 8: spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/ Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) } Actual: Expected: C = CH, O = Example.com, CN = foo.example.com Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Rocky 8: spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024 Failure/Error: its(:keylength) { is_expected.to eq 1024 } expected: 1024 got: 0 (compared using ==) Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Rocky 8
Process completed with exit code 1.
Puppet / Puppet 7 - Ubuntu 24.04: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'ubuntu2404-64-puppet7.example.com' exited with 6 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140243280.CW5OZc.pp Last 10 lines of output were: Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com] �[mNotice: Applied catalog in 0.05 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Ubuntu 24.04: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'ubuntu2404-64-puppet7.example.com' exited with 4 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140245282.Tj9u2m.pp Last 10 lines of output were: �[mNotice: Compiled catalog for ubuntu2404-64-puppet7.example.com in environment production in 0.06 seconds Info: Using environment 'production' Info: Applying configuration version '1727704966' Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies �[mNotice: Applied catalog in 0.02 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Ubuntu 24.04: spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"} Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) } expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false ...and: expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""} Diff for (have attributes {:owner => "nobody"}): @@ -1 +1 @@ -:owner => "nobody", +:owner => "", Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Ubuntu 24.04: spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt" Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') } expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Ubuntu 24.04: spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate Failure/Error: it { is_expected.to be_certificate } expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Ubuntu 24.04: spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid Failure/Error: it { is_expected.to be_valid } expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Ubuntu 24.04: spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/ Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) } Actual: Expected: C = CH, O = Example.com, CN = foo.example.com Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Ubuntu 24.04: spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024 Failure/Error: its(:keylength) { is_expected.to eq 1024 } expected: 1024 got: 0 (compared using ==) Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Ubuntu 24.04
Process completed with exit code 1.
Puppet / Puppet 8 - Ubuntu 20.04: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'ubuntu2004-64-puppet8.example.com' exited with 6 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140245154.IEFVNc.pp Last 10 lines of output were: Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com] �[mNotice: Applied catalog in 0.04 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Ubuntu 20.04: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'ubuntu2004-64-puppet8.example.com' exited with 4 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140247321.AvBKlw.pp Last 10 lines of output were: �[mNotice: Compiled catalog for ubuntu2004-64-puppet8.example.com in environment production in 0.07 seconds Info: Using environment 'production' Info: Applying configuration version '1727704969' Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies �[mNotice: Applied catalog in 0.02 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Ubuntu 20.04: spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"} Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) } expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false ...and: expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""} Diff for (have attributes {:owner => "nobody"}): @@ -1 +1 @@ -:owner => "nobody", +:owner => "", Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Ubuntu 20.04: spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt" Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') } expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Ubuntu 20.04: spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate Failure/Error: it { is_expected.to be_certificate } expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Ubuntu 20.04: spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid Failure/Error: it { is_expected.to be_valid } expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Ubuntu 20.04: spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/ Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) } Actual: Expected: C = CH, O = Example.com, CN = foo.example.com Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Ubuntu 20.04: spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024 Failure/Error: its(:keylength) { is_expected.to eq 1024 } expected: 1024 got: 0 (compared using ==) Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Ubuntu 20.04
Process completed with exit code 1.
Puppet / Puppet 8 - CentOS 9: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'centos9-64-puppet8.example.com' exited with 6 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140317063.rZr4dT.pp Last 10 lines of output were: Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Extra option: "{:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}" req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Extra option: "{:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}" req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com] Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies �[mNotice: Applied catalog in 0.04 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - CentOS 9: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'centos9-64-puppet8.example.com' exited with 4 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140319230.sSQEAt.pp Last 10 lines of output were: Info: Applying configuration version '1727705001' Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Extra option: "{:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}" req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Extra option: "{:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}" req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies �[mNotice: Applied catalog in 0.02 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - CentOS 9: spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"} Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) } expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false ...and: expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""} Diff for (have attributes {:owner => "nobody"}): @@ -1 +1 @@ -:owner => "nobody", +:owner => "", Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - CentOS 9: spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt" Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') } expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - CentOS 9: spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate Failure/Error: it { is_expected.to be_certificate } expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - CentOS 9: spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid Failure/Error: it { is_expected.to be_valid } expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - CentOS 9: spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/ Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) } Actual: Expected: C = CH, O = Example.com, CN = foo.example.com Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - CentOS 9: spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024 Failure/Error: its(:keylength) { is_expected.to eq 1024 } expected: 1024 got: 0 (compared using ==) Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - CentOS 9
Process completed with exit code 1.
Puppet / Puppet 8 - Ubuntu 22.04: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'ubuntu2204-64-puppet8.example.com' exited with 6 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140431712.0V2iBJ.pp Last 10 lines of output were: Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com] �[mNotice: Applied catalog in 0.04 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Ubuntu 22.04: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'ubuntu2204-64-puppet8.example.com' exited with 4 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140433784.4o4Jky.pp Last 10 lines of output were: �[mNotice: Compiled catalog for ubuntu2204-64-puppet8.example.com in environment production in 0.07 seconds Info: Using environment 'production' Info: Applying configuration version '1727705075' Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies �[mNotice: Applied catalog in 0.02 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Ubuntu 22.04: spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"} Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) } expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false ...and: expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""} Diff for (have attributes {:owner => "nobody"}): @@ -1 +1 @@ -:owner => "nobody", +:owner => "", Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Ubuntu 22.04: spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt" Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') } expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Ubuntu 22.04: spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate Failure/Error: it { is_expected.to be_certificate } expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Ubuntu 22.04: spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid Failure/Error: it { is_expected.to be_valid } expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Ubuntu 22.04: spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/ Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) } Actual: Expected: C = CH, O = Example.com, CN = foo.example.com Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Ubuntu 22.04: spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024 Failure/Error: its(:keylength) { is_expected.to eq 1024 } expected: 1024 got: 0 (compared using ==) Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Ubuntu 22.04
Process completed with exit code 1.
Puppet / Puppet 7 - OracleLinux 8: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'oracle8-64-puppet7.example.com' exited with 6 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140442782.MKD70b.pp Last 10 lines of output were: Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com] �[mNotice: Applied catalog in 0.06 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - OracleLinux 8: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'oracle8-64-puppet7.example.com' exited with 4 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140444741.f2qXQ7.pp Last 10 lines of output were: �[mNotice: Compiled catalog for oracle8-64-puppet7.example.com in environment production in 0.06 seconds Info: Using environment 'production' Info: Applying configuration version '1727705086' Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies �[mNotice: Applied catalog in 0.02 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - OracleLinux 8: spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"} Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) } expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false ...and: expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""} Diff for (have attributes {:owner => "nobody"}): @@ -1 +1 @@ -:owner => "nobody", +:owner => "", Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - OracleLinux 8: spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt" Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') } expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - OracleLinux 8: spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate Failure/Error: it { is_expected.to be_certificate } expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - OracleLinux 8: spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid Failure/Error: it { is_expected.to be_valid } expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - OracleLinux 8: spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/ Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) } Actual: Expected: C = CH, O = Example.com, CN = foo.example.com Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - OracleLinux 8: spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024 Failure/Error: its(:keylength) { is_expected.to eq 1024 } expected: 1024 got: 0 (compared using ==) Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - OracleLinux 8
Process completed with exit code 1.
Puppet / Distro Puppet - Archlinux rolling: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'archlinuxrolling-64.example.com' exited with 6 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140517507.bpWl1s.pp Last 10 lines of output were: Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Extra option: "{:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}" req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Extra option: "{:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}" req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com] �[mNotice: Applied catalog in 0.05 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Distro Puppet - Archlinux rolling: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'archlinuxrolling-64.example.com' exited with 4 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140519527.pobo0d.pp Last 10 lines of output were: Info: Applying configuration version '1727705121' Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Extra option: "{:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}" req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Extra option: "{:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}" req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies �[mNotice: Applied catalog in 0.02 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Distro Puppet - Archlinux rolling: spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"} Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) } expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false ...and: expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""} Diff for (have attributes {:owner => "nobody"}): @@ -1 +1 @@ -:owner => "nobody", +:owner => "", Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Distro Puppet - Archlinux rolling: spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt" Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') } expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Distro Puppet - Archlinux rolling: spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate Failure/Error: it { is_expected.to be_certificate } expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Distro Puppet - Archlinux rolling: spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid Failure/Error: it { is_expected.to be_valid } expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Distro Puppet - Archlinux rolling: spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/ Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) } Actual: Expected: C = CH, O = Example.com, CN = foo.example.com Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Distro Puppet - Archlinux rolling: spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024 Failure/Error: its(:keylength) { is_expected.to eq 1024 } expected: 1024 got: 0 (compared using ==) Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Distro Puppet - Archlinux rolling
Process completed with exit code 1.
Puppet / Puppet 7 - Ubuntu 20.04: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'ubuntu2004-64-puppet7.example.com' exited with 6 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140851752.JqtQ9m.pp Last 10 lines of output were: Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com] �[mNotice: Applied catalog in 0.06 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Ubuntu 20.04: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'ubuntu2004-64-puppet7.example.com' exited with 4 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140853758.Z63gxF.pp Last 10 lines of output were: �[mNotice: Compiled catalog for ubuntu2004-64-puppet7.example.com in environment production in 0.06 seconds Info: Using environment 'production' Info: Applying configuration version '1727705335' Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies �[mNotice: Applied catalog in 0.02 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Ubuntu 20.04: spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"} Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) } expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false ...and: expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""} Diff for (have attributes {:owner => "nobody"}): @@ -1 +1 @@ -:owner => "nobody", +:owner => "", Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Ubuntu 20.04: spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt" Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') } expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Ubuntu 20.04: spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate Failure/Error: it { is_expected.to be_certificate } expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Ubuntu 20.04: spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid Failure/Error: it { is_expected.to be_valid } expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Ubuntu 20.04: spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/ Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) } Actual: Expected: C = CH, O = Example.com, CN = foo.example.com Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Ubuntu 20.04: spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024 Failure/Error: its(:keylength) { is_expected.to eq 1024 } expected: 1024 got: 0 (compared using ==) Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Ubuntu 20.04
Process completed with exit code 1.
Puppet / Puppet 8 - AlmaLinux 9: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'almalinux9-64-puppet8.example.com' exited with 6 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140939913.2XMtaK.pp Last 10 lines of output were: Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com] �[mNotice: Applied catalog in 0.05 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - AlmaLinux 9: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'almalinux9-64-puppet8.example.com' exited with 4 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_140941992.AuBKBQ.pp Last 10 lines of output were: �[mNotice: Compiled catalog for almalinux9-64-puppet8.example.com in environment production in 0.06 seconds Info: Using environment 'production' Info: Applying configuration version '1727705383' Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies �[mNotice: Applied catalog in 0.02 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - AlmaLinux 9: spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"} Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) } expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false ...and: expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""} Diff for (have attributes {:owner => "nobody"}): @@ -1 +1 @@ -:owner => "nobody", +:owner => "", Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - AlmaLinux 9: spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt" Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') } expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - AlmaLinux 9: spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate Failure/Error: it { is_expected.to be_certificate } expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - AlmaLinux 9: spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid Failure/Error: it { is_expected.to be_valid } expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - AlmaLinux 9: spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/ Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) } Actual: Expected: C = CH, O = Example.com, CN = foo.example.com Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - AlmaLinux 9: spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024 Failure/Error: its(:keylength) { is_expected.to eq 1024 } expected: 1024 got: 0 (compared using ==) Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - AlmaLinux 9
Process completed with exit code 1.
Puppet / Puppet 8 - OracleLinux 8: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'oracle8-64-puppet8.example.com' exited with 6 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141014254.ahMIv3.pp Last 10 lines of output were: Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com] �[mNotice: Applied catalog in 0.04 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - OracleLinux 8: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'oracle8-64-puppet8.example.com' exited with 4 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141016452.TG0qJo.pp Last 10 lines of output were: �[mNotice: Compiled catalog for oracle8-64-puppet8.example.com in environment production in 0.07 seconds Info: Using environment 'production' Info: Applying configuration version '1727705418' Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies �[mNotice: Applied catalog in 0.02 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - OracleLinux 8: spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"} Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) } expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false ...and: expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""} Diff for (have attributes {:owner => "nobody"}): @@ -1 +1 @@ -:owner => "nobody", +:owner => "", Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - OracleLinux 8: spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt" Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') } expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - OracleLinux 8: spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate Failure/Error: it { is_expected.to be_certificate } expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - OracleLinux 8: spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid Failure/Error: it { is_expected.to be_valid } expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - OracleLinux 8: spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/ Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) } Actual: Expected: C = CH, O = Example.com, CN = foo.example.com Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - OracleLinux 8: spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024 Failure/Error: its(:keylength) { is_expected.to eq 1024 } expected: 1024 got: 0 (compared using ==) Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - OracleLinux 8
Process completed with exit code 1.
Puppet / Puppet 7 - Ubuntu 22.04: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'ubuntu2204-64-puppet7.example.com' exited with 6 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141055258.ktpVpU.pp Last 10 lines of output were: Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com] �[mNotice: Applied catalog in 0.04 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Ubuntu 22.04: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'ubuntu2204-64-puppet7.example.com' exited with 4 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141057218.AjXVCq.pp Last 10 lines of output were: �[mNotice: Compiled catalog for ubuntu2204-64-puppet7.example.com in environment production in 0.06 seconds Info: Using environment 'production' Info: Applying configuration version '1727705458' Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies �[mNotice: Applied catalog in 0.02 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Ubuntu 22.04: spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"} Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) } expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false ...and: expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""} Diff for (have attributes {:owner => "nobody"}): @@ -1 +1 @@ -:owner => "nobody", +:owner => "", Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Ubuntu 22.04: spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt" Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') } expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Ubuntu 22.04: spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate Failure/Error: it { is_expected.to be_certificate } expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Ubuntu 22.04: spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid Failure/Error: it { is_expected.to be_valid } expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Ubuntu 22.04: spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/ Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) } Actual: Expected: C = CH, O = Example.com, CN = foo.example.com Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Ubuntu 22.04: spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024 Failure/Error: its(:keylength) { is_expected.to eq 1024 } expected: 1024 got: 0 (compared using ==) Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Ubuntu 22.04
Process completed with exit code 1.
Puppet / Puppet 8 - Ubuntu 24.04: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'ubuntu2404-64-puppet8.example.com' exited with 6 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141120377.WHWsnt.pp Last 10 lines of output were: Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com] �[mNotice: Applied catalog in 0.04 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Ubuntu 24.04: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'ubuntu2404-64-puppet8.example.com' exited with 4 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141122511.kPj2kZ.pp Last 10 lines of output were: �[mNotice: Compiled catalog for ubuntu2404-64-puppet8.example.com in environment production in 0.07 seconds Info: Using environment 'production' Info: Applying configuration version '1727705484' Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies �[mNotice: Applied catalog in 0.02 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Ubuntu 24.04: spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"} Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) } expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false ...and: expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""} Diff for (have attributes {:owner => "nobody"}): @@ -1 +1 @@ -:owner => "nobody", +:owner => "", Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Ubuntu 24.04: spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt" Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') } expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Ubuntu 24.04: spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate Failure/Error: it { is_expected.to be_certificate } expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Ubuntu 24.04: spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid Failure/Error: it { is_expected.to be_valid } expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Ubuntu 24.04: spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/ Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) } Actual: Expected: C = CH, O = Example.com, CN = foo.example.com Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Ubuntu 24.04: spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024 Failure/Error: its(:keylength) { is_expected.to eq 1024 } expected: 1024 got: 0 (compared using ==) Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Ubuntu 24.04
Process completed with exit code 1.
Puppet / Puppet 7 - Rocky 8: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'rocky8-64-puppet7.example.com' exited with 6 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141227323.QaJ34X.pp Last 10 lines of output were: Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com] �[mNotice: Applied catalog in 0.05 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Rocky 8: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'rocky8-64-puppet7.example.com' exited with 4 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141229228.rTfR5O.pp Last 10 lines of output were: �[mNotice: Compiled catalog for rocky8-64-puppet7.example.com in environment production in 0.06 seconds Info: Using environment 'production' Info: Applying configuration version '1727705550' Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies �[mNotice: Applied catalog in 0.02 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Rocky 8: spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"} Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) } expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false ...and: expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""} Diff for (have attributes {:owner => "nobody"}): @@ -1 +1 @@ -:owner => "nobody", +:owner => "", Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Rocky 8: spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt" Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') } expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Rocky 8: spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate Failure/Error: it { is_expected.to be_certificate } expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Rocky 8: spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid Failure/Error: it { is_expected.to be_valid } expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Rocky 8: spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/ Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) } Actual: Expected: C = CH, O = Example.com, CN = foo.example.com Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Rocky 8: spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024 Failure/Error: its(:keylength) { is_expected.to eq 1024 } expected: 1024 got: 0 (compared using ==) Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Rocky 8
Process completed with exit code 1.
Puppet / Puppet 8 - Rocky 9: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'rocky9-64-puppet8.example.com' exited with 6 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141245376.RlXnFQ.pp Last 10 lines of output were: Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com] �[mNotice: Applied catalog in 0.04 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Rocky 9: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'rocky9-64-puppet8.example.com' exited with 4 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141247624.U2K0gm.pp Last 10 lines of output were: �[mNotice: Compiled catalog for rocky9-64-puppet8.example.com in environment production in 0.07 seconds Info: Using environment 'production' Info: Applying configuration version '1727705569' Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies �[mNotice: Applied catalog in 0.02 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Rocky 9: spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"} Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) } expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false ...and: expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""} Diff for (have attributes {:owner => "nobody"}): @@ -1 +1 @@ -:owner => "nobody", +:owner => "", Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Rocky 9: spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt" Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') } expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Rocky 9: spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate Failure/Error: it { is_expected.to be_certificate } expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Rocky 9: spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid Failure/Error: it { is_expected.to be_valid } expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Rocky 9: spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/ Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) } Actual: Expected: C = CH, O = Example.com, CN = foo.example.com Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Rocky 9: spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024 Failure/Error: its(:keylength) { is_expected.to eq 1024 } expected: 1024 got: 0 (compared using ==) Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Rocky 9
Process completed with exit code 1.
Puppet / Puppet 7 - OracleLinux 9: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'oracle9-64-puppet7.example.com' exited with 6 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141421228.FkIy0j.pp Last 10 lines of output were: Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com] �[mNotice: Applied catalog in 0.06 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - OracleLinux 9: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'oracle9-64-puppet7.example.com' exited with 4 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141423313.szcpwf.pp Last 10 lines of output were: �[mNotice: Compiled catalog for oracle9-64-puppet7.example.com in environment production in 0.06 seconds Info: Using environment 'production' Info: Applying configuration version '1727705665' Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies �[mNotice: Applied catalog in 0.02 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - OracleLinux 9: spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"} Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) } expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false ...and: expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""} Diff for (have attributes {:owner => "nobody"}): @@ -1 +1 @@ -:owner => "nobody", +:owner => "", Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - OracleLinux 9: spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt" Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') } expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - OracleLinux 9: spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate Failure/Error: it { is_expected.to be_certificate } expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - OracleLinux 9: spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid Failure/Error: it { is_expected.to be_valid } expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - OracleLinux 9: spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/ Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) } Actual: Expected: C = CH, O = Example.com, CN = foo.example.com Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - OracleLinux 9: spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024 Failure/Error: its(:keylength) { is_expected.to eq 1024 } expected: 1024 got: 0 (compared using ==) Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - OracleLinux 9
Process completed with exit code 1.
Puppet / Puppet 7 - CentOS 9: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'centos9-64-puppet7.example.com' exited with 6 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141427798.s9d51K.pp Last 10 lines of output were: Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Extra option: "{:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}" req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Extra option: "{:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}" req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com] �[mNotice: Applied catalog in 0.05 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - CentOS 9: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'centos9-64-puppet7.example.com' exited with 4 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141429825.qkaFcr.pp Last 10 lines of output were: Info: Applying configuration version '1727705671' Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Extra option: "{:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}" req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Extra option: "{:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}" req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies �[mNotice: Applied catalog in 0.02 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - CentOS 9: spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"} Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) } expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false ...and: expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""} Diff for (have attributes {:owner => "nobody"}): @@ -1 +1 @@ -:owner => "nobody", +:owner => "", Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - CentOS 9: spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt" Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') } expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - CentOS 9: spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate Failure/Error: it { is_expected.to be_certificate } expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - CentOS 9: spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid Failure/Error: it { is_expected.to be_valid } expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - CentOS 9: spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/ Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) } Actual: Expected: C = CH, O = Example.com, CN = foo.example.com Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - CentOS 9: spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024 Failure/Error: its(:keylength) { is_expected.to eq 1024 } expected: 1024 got: 0 (compared using ==) Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - CentOS 9
Process completed with exit code 1.
Puppet / Puppet 8 - Debian 12: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'debian12-64-puppet8.example.com' exited with 6 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141447155.0BHDW9.pp Last 10 lines of output were: Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com] �[mNotice: Applied catalog in 0.04 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Debian 12: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'debian12-64-puppet8.example.com' exited with 4 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141449199.Ox2C95.pp Last 10 lines of output were: �[mNotice: Compiled catalog for debian12-64-puppet8.example.com in environment production in 0.07 seconds Info: Using environment 'production' Info: Applying configuration version '1727705690' Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies �[mNotice: Applied catalog in 0.02 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Debian 12: spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"} Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) } expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false ...and: expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""} Diff for (have attributes {:owner => "nobody"}): @@ -1 +1 @@ -:owner => "nobody", +:owner => "", Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Debian 12: spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt" Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') } expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Debian 12: spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate Failure/Error: it { is_expected.to be_certificate } expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Debian 12: spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid Failure/Error: it { is_expected.to be_valid } expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Debian 12: spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/ Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) } Actual: Expected: C = CH, O = Example.com, CN = foo.example.com Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Debian 12: spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024 Failure/Error: its(:keylength) { is_expected.to eq 1024 } expected: 1024 got: 0 (compared using ==) Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - Debian 12
Process completed with exit code 1.
Puppet / Puppet 8 - AlmaLinux 8: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'almalinux8-64-puppet8.example.com' exited with 6 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141533635.OUl1x7.pp Last 10 lines of output were: Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com] Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies �[mNotice: Applied catalog in 0.04 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - AlmaLinux 8: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'almalinux8-64-puppet8.example.com' exited with 4 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141535731.Wn9CHJ.pp Last 10 lines of output were: �[mNotice: Compiled catalog for almalinux8-64-puppet8.example.com in environment production in 0.06 seconds Info: Using environment 'production' Info: Applying configuration version '1727705737' Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies �[mNotice: Applied catalog in 0.02 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - AlmaLinux 8: spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"} Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) } expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false ...and: expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""} Diff for (have attributes {:owner => "nobody"}): @@ -1 +1 @@ -:owner => "nobody", +:owner => "", Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - AlmaLinux 8: spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt" Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') } expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - AlmaLinux 8: spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate Failure/Error: it { is_expected.to be_certificate } expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - AlmaLinux 8: spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid Failure/Error: it { is_expected.to be_valid } expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - AlmaLinux 8: spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/ Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) } Actual: Expected: C = CH, O = Example.com, CN = foo.example.com Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - AlmaLinux 8: spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024 Failure/Error: its(:keylength) { is_expected.to eq 1024 } expected: 1024 got: 0 (compared using ==) Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - AlmaLinux 8
Process completed with exit code 1.
Puppet / Puppet 7 - AlmaLinux 8: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'almalinux8-64-puppet7.example.com' exited with 6 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141653797.5kCUtK.pp Last 10 lines of output were: Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com] Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies �[mNotice: Applied catalog in 0.05 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - AlmaLinux 8: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'almalinux8-64-puppet7.example.com' exited with 4 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_141655785.ljvZfx.pp Last 10 lines of output were: �[mNotice: Compiled catalog for almalinux8-64-puppet7.example.com in environment production in 0.06 seconds Info: Using environment 'production' Info: Applying configuration version '1727705817' Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies �[mNotice: Applied catalog in 0.02 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - AlmaLinux 8: spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"} Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) } expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false ...and: expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""} Diff for (have attributes {:owner => "nobody"}): @@ -1 +1 @@ -:owner => "nobody", +:owner => "", Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - AlmaLinux 8: spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt" Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') } expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - AlmaLinux 8: spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate Failure/Error: it { is_expected.to be_certificate } expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - AlmaLinux 8: spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid Failure/Error: it { is_expected.to be_valid } expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - AlmaLinux 8: spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/ Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) } Actual: Expected: C = CH, O = Example.com, CN = foo.example.com Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - AlmaLinux 8: spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024 Failure/Error: its(:keylength) { is_expected.to eq 1024 } expected: 1024 got: 0 (compared using ==) Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - AlmaLinux 8
Process completed with exit code 1.
Puppet / Puppet 7 - Debian 12: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'debian12-64-puppet7.example.com' exited with 6 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_142447180.1dEvm1.pp Last 10 lines of output were: Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com] �[mNotice: Applied catalog in 0.05 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Debian 12: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'debian12-64-puppet7.example.com' exited with 4 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_142449139.UHbHgs.pp Last 10 lines of output were: �[mNotice: Compiled catalog for debian12-64-puppet7.example.com in environment production in 0.06 seconds Info: Using environment 'production' Info: Applying configuration version '1727706290' Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies �[mNotice: Applied catalog in 0.02 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Debian 12: spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"} Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) } expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false ...and: expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""} Diff for (have attributes {:owner => "nobody"}): @@ -1 +1 @@ -:owner => "nobody", +:owner => "", Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Debian 12: spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt" Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') } expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Debian 12: spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate Failure/Error: it { is_expected.to be_certificate } expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Debian 12: spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid Failure/Error: it { is_expected.to be_valid } expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Debian 12: spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/ Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) } Actual: Expected: C = CH, O = Example.com, CN = foo.example.com Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Debian 12: spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024 Failure/Error: its(:keylength) { is_expected.to eq 1024 } expected: 1024 got: 0 (compared using ==) Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 7 - Debian 12
Process completed with exit code 1.
Puppet / Puppet 8 - OracleLinux 9: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L4
x509_cert example behaves like the example applies with no errors Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'oracle9-64-puppet8.example.com' exited with 6 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_143214880.Qnhp3j.pp Last 10 lines of output were: Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Failed to call refresh: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies Info: Openssl::Certificate::X509[foo.example.com]: Unscheduling all events on Openssl::Certificate::X509[foo.example.com] �[mNotice: Applied catalog in 0.04 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - OracleLinux 9: vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb#L8
x509_cert example behaves like the example applies a second time without changes Failure/Error: raise CommandFailure, "Host '#{self}' exited with #{result.exit_code} running:\n #{cmdline}\nLast #{@options[:trace_limit]} lines of output were:\n#{result.formatted_output(@options[:trace_limit])}" Beaker::Host::CommandFailure: Host 'oracle9-64-puppet8.example.com' exited with 4 running: puppet apply --verbose --detailed-exitcodes /tmp/apply_manifest_143217016.OAkPyA.pp Last 10 lines of output were: �[mNotice: Compiled catalog for oracle9-64-puppet8.example.com in environment production in 0.06 seconds Info: Using environment 'production' Info: Applying configuration version '1727706738' Error: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. Error: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_request[/tmp/foo.example.com.csr]/ensure: change from 'absent' to 'present' failed: Execution of '/usr/bin/openssl req -new -key /tmp/foo.example.com.key -config /tmp/foo.example.com.cnf -out /tmp/foo.example.com.csr -passin env:CERTIFICATE_PASSIN {:environment=>{"CERTIFICATE_PASSIN"=>"mahje1Qu"}}' returned 1: req: Use -help for summary. �[mNotice: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Dependency X509_request[/tmp/foo.example.com.csr] has failures: true Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/X509_cert[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.crt]: Skipping because of failed dependencies Warning: /Stage[main]/Main/Openssl::Certificate::X509[foo.example.com]/File[/tmp/foo.example.com.csr]: Skipping because of failed dependencies �[mNotice: Applied catalog in 0.02 seconds Shared Example Group: "an idempotent resource" called from ./vendor/bundle/ruby/3.2.0/gems/voxpupuli-acceptance-3.2.0/lib/voxpupuli/acceptance/examples.rb:14 Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - OracleLinux 9: spec/acceptance/x509_cert_spec.rb#L11
x509_cert example behaves like the example is expected to be file and have attributes {:owner => "nobody"} Failure/Error: it { expect(file('/tmp/foo.example.com.crt')).to be_file.and(have_attributes(owner: 'nobody')) } expected `File "/tmp/foo.example.com.crt".file?` to be truthy, got false ...and: expected File "/tmp/foo.example.com.crt" to have attributes {:owner => "nobody"} but had attributes {:owner => ""} Diff for (have attributes {:owner => "nobody"}): @@ -1 +1 @@ -:owner => "nobody", +:owner => "", Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - OracleLinux 9: spec/acceptance/x509_cert_spec.rb#L22
x509_cert example behaves like the example is expected to have matching certificate "/tmp/foo.example.com.crt" Failure/Error: it { expect(x509_private_key('/tmp/foo.example.com.key', passin: 'pass:mahje1Qu')).to have_matching_certificate('/tmp/foo.example.com.crt') } expected `X509 private key "/tmp/foo.example.com.key".has_matching_certificate?("/tmp/foo.example.com.crt")` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - OracleLinux 9: spec/acceptance/x509_cert_spec.rb#L15
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be certificate Failure/Error: it { is_expected.to be_certificate } expected `X509 certificate "/tmp/foo.example.com.crt".certificate?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - OracleLinux 9: spec/acceptance/x509_cert_spec.rb#L16
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" is expected to be valid Failure/Error: it { is_expected.to be_valid } expected `X509 certificate "/tmp/foo.example.com.crt".valid?` to be truthy, got false Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - OracleLinux 9: spec/acceptance/x509_cert_spec.rb#L17
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" subject is expected to match without whitespace /C = CH, O = Example.com, CN = foo.example.com/ Failure/Error: its(:subject) { is_expected.to match_without_whitespace(%r{C = CH, O = Example.com, CN = foo.example.com}) } Actual: Expected: C = CH, O = Example.com, CN = foo.example.com Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - OracleLinux 9: spec/acceptance/x509_cert_spec.rb#L18
x509_cert example behaves like the example X509 certificate "/tmp/foo.example.com.crt" keylength is expected to eq 1024 Failure/Error: its(:keylength) { is_expected.to eq 1024 } expected: 1024 got: 0 (compared using ==) Shared Example Group: "the example" called from ./spec/acceptance/x509_cert_spec.rb:10
Puppet / Puppet 8 - OracleLinux 9
Process completed with exit code 1.
Puppet / Puppet 7 - Rocky 9
Canceling since a higher priority waiting request for '228/merge' exists
Puppet / Puppet 7 - Rocky 9
The operation was canceled.
Puppet / Puppet 7 - AlmaLinux 9
Canceling since a higher priority waiting request for '228/merge' exists
Puppet / Puppet 7 - AlmaLinux 9
The operation was canceled.
Puppet / Test suite
Process completed with exit code 1.
Puppet / Static validations: metadata.json#L1
Skipping EOL operating system Debian 11