Skip to content

modulesync 7.2.0

modulesync 7.2.0 #90

Triggered via pull request December 15, 2023 12:36
Status Failure
Total duration 33m 32s
Artifacts

ci.yml

on: pull_request
Puppet  /  Static validations
22s
Puppet / Static validations
Matrix: Puppet / acceptance
Matrix: Puppet / unit
Puppet  /  Test suite
0s
Puppet / Test suite
Fit to window
Zoom out
Zoom in

Annotations

4 errors
Puppet / 8 (Ruby 3.2): spec/classes/os_spec.rb#L49
unattended_upgrades on debian-12-x86_64 is expected to contain File[/etc/apt/apt.conf.d/50unattended-upgrades] with content =~ /Unattended-Upgrade::Origins-Pattern\ {\n \t"origin=Debian,codename=\${distro_codename},label=Debian";\n \t"origin=Debian,codename=\${distro_codename},label=Debian-Security";\n };/x Failure/Error: is_expected.to create_file(file_unattended).with_content( /Unattended-Upgrade::Origins-Pattern\ {\n \t"origin=Debian,codename=\${distro_codename},label=Debian";\n \t"origin=Debian,codename=\${distro_codename},label=Debian-Security";\n };/x ) expected that the catalogue would contain File[/etc/apt/apt.conf.d/50unattended-upgrades] with content set to /Unattended-Upgrade::Origins-Pattern\ {\n \t"origin=Debian,codename=\${distro_codename},label=Debian";\n \t"origin=Debian,codename=\${distro_codename},label=Debian-Security";\n };/x but it is set to "// This file is managed by Puppet. DO NOT EDIT.\n// Automatically upgrade packages from these (origin:archive) pairs\n//\n// Note that in Ubuntu security updates may pull in new dependencies\n// from non-security sources (e.g. chromium). By allowing the release\n// pocket these get automatically pulled in.\nUnattended-Upgrade::Origins-Pattern {\n\t\"origin=Debian,codename=${distro_codename},label=Debian\";\n\t\"origin=Debian,codename=${distro_codename}-security,label=Debian-Security\";\n};\n\n// List of packages to not update (regexp are supported)\nUnattended-Upgrade::Package-Blacklist {\n};\n\n// List of days in the week that updates should be applied.\n// The days can be specified as localized abbreviated or full names.\n// Or as integers where \"0\" is Sunday, \"1\" is Monday etc.\n// Require Unattended-upgrades version >=0.91 to work, else it is ignored\nUnattended-Upgrade::Update-Days {\n};\n\n// This option allows you to control if on a unclean dpkg exit\n// unattended-upgrades will automatically run\n// dpkg --force-confold --configure -a\n// The default is true, to ensure updates keep getting installed\nUnattended-Upgrade::AutoFixInterruptedDpkg \"true\";\n\n// Split the upgrade into the smallest possible chunks so that\n// they can be interrupted with SIGTERM. This makes the upgrade\n// a bit slower but it has the benefit that shutdown while a upgrade\n// is running is possible (with a small delay)\nUnattended-Upgrade::MinimalSteps \"true\";\n\n// Install all unattended-upgrades when the machine is shuting down\n// instead of doing it in the background while the machine is running\n// This will (obviously) make shutdown slower\nUnattended-Upgrade::InstallOnShutdown \"false\";\n\n\n\n\n// Do automatic removal of new unused dependencies after the upgrade\n// (equivalent to apt-get autoremove)\nUnattended-Upgrade::Remove-Unused-Dependencies \"true\";\n\n// Automatically reboot *WITHOUT CONFIRMATION*\n// if the file /var/run/reboot-required is found after the upgrade\nUnattended-Upgrade::Automatic-Reboot \"false\";\n\n// Automatically reboot even if there are users currently logged in\n// when Unattended-Upgrade::Automatic-Reboot is set to true\nUnattended-Upgrade::Automatic-Reboot-WithUsers \"true\";\n\n// If automatic reboot is enabled and needed, reboot at the specific\n// time instead of immediately\n// Default: \"now\"\nUnattended-Upgrade::Automatic-Reboot-Time \"now\";\n\n\n\n\n\n" Diff: @@ -1,5 +1,59 @@ -(?x-mi:Unattended-Upgrade::Origins-Pattern\ {\n - \t"origin=Debian,codename=\${distro_codename},label=Debian";\n - \t"origin=Debian,codename=\${distro_codename},label=Debian-Security";\n - };) +// This file is managed by Puppet. DO NOT EDIT. +// Automatically upgrade packages from these (origin:archive) pairs +// +// Note that in Ubuntu security updates may pull in new dependencies +// from non-security sources (e.g. chromium). By allowing the release +// pocket these get automatically pulled in. +Unattended-Upgrade::Origins-Pattern { + "origin=Debian,codename=${distro
Puppet / 8 (Ruby 3.2)
Process completed with exit code 1.
Puppet / 7 (Ruby 2.7): spec/classes/os_spec.rb#L49
unattended_upgrades on debian-12-x86_64 is expected to contain File[/etc/apt/apt.conf.d/50unattended-upgrades] with content =~ /Unattended-Upgrade::Origins-Pattern\ {\n \t"origin=Debian,codename=\${distro_codename},label=Debian";\n \t"origin=Debian,codename=\${distro_codename},label=Debian-Security";\n };/x Failure/Error: is_expected.to create_file(file_unattended).with_content( /Unattended-Upgrade::Origins-Pattern\ {\n \t"origin=Debian,codename=\${distro_codename},label=Debian";\n \t"origin=Debian,codename=\${distro_codename},label=Debian-Security";\n };/x ) expected that the catalogue would contain File[/etc/apt/apt.conf.d/50unattended-upgrades] with content set to /Unattended-Upgrade::Origins-Pattern\ {\n \t"origin=Debian,codename=\${distro_codename},label=Debian";\n \t"origin=Debian,codename=\${distro_codename},label=Debian-Security";\n };/x but it is set to "// This file is managed by Puppet. DO NOT EDIT.\n// Automatically upgrade packages from these (origin:archive) pairs\n//\n// Note that in Ubuntu security updates may pull in new dependencies\n// from non-security sources (e.g. chromium). By allowing the release\n// pocket these get automatically pulled in.\nUnattended-Upgrade::Origins-Pattern {\n\t\"origin=Debian,codename=${distro_codename},label=Debian\";\n\t\"origin=Debian,codename=${distro_codename}-security,label=Debian-Security\";\n};\n\n// List of packages to not update (regexp are supported)\nUnattended-Upgrade::Package-Blacklist {\n};\n\n// List of days in the week that updates should be applied.\n// The days can be specified as localized abbreviated or full names.\n// Or as integers where \"0\" is Sunday, \"1\" is Monday etc.\n// Require Unattended-upgrades version >=0.91 to work, else it is ignored\nUnattended-Upgrade::Update-Days {\n};\n\n// This option allows you to control if on a unclean dpkg exit\n// unattended-upgrades will automatically run\n// dpkg --force-confold --configure -a\n// The default is true, to ensure updates keep getting installed\nUnattended-Upgrade::AutoFixInterruptedDpkg \"true\";\n\n// Split the upgrade into the smallest possible chunks so that\n// they can be interrupted with SIGTERM. This makes the upgrade\n// a bit slower but it has the benefit that shutdown while a upgrade\n// is running is possible (with a small delay)\nUnattended-Upgrade::MinimalSteps \"true\";\n\n// Install all unattended-upgrades when the machine is shuting down\n// instead of doing it in the background while the machine is running\n// This will (obviously) make shutdown slower\nUnattended-Upgrade::InstallOnShutdown \"false\";\n\n\n\n\n// Do automatic removal of new unused dependencies after the upgrade\n// (equivalent to apt-get autoremove)\nUnattended-Upgrade::Remove-Unused-Dependencies \"true\";\n\n// Automatically reboot *WITHOUT CONFIRMATION*\n// if the file /var/run/reboot-required is found after the upgrade\nUnattended-Upgrade::Automatic-Reboot \"false\";\n\n// Automatically reboot even if there are users currently logged in\n// when Unattended-Upgrade::Automatic-Reboot is set to true\nUnattended-Upgrade::Automatic-Reboot-WithUsers \"true\";\n\n// If automatic reboot is enabled and needed, reboot at the specific\n// time instead of immediately\n// Default: \"now\"\nUnattended-Upgrade::Automatic-Reboot-Time \"now\";\n\n\n\n\n\n" Diff: @@ -1,5 +1,59 @@ -(?x-mi:Unattended-Upgrade::Origins-Pattern\ {\n - \t"origin=Debian,codename=\${distro_codename},label=Debian";\n - \t"origin=Debian,codename=\${distro_codename},label=Debian-Security";\n - };) +// This file is managed by Puppet. DO NOT EDIT. +// Automatically upgrade packages from these (origin:archive) pairs +// +// Note that in Ubuntu security updates may pull in new dependencies +// from non-security sources (e.g. chromium). By allowing the release +// pocket these get automatically pulled in. +Unattended-Upgrade::Origins-Pattern { + "origin=Debian,codename=${distro
Puppet / 7 (Ruby 2.7)
Process completed with exit code 1.