Version information
This version is compatible with:
- Puppet Enterprise 2023.8.x, 2023.7.x, 2023.6.x, 2023.5.x, 2023.4.x, 2023.3.x, 2023.2.x, 2023.1.x, 2023.0.x, 2021.7.x, 2021.6.x, 2021.5.x, 2021.4.x, 2021.3.x, 2021.2.x, 2021.1.x, 2021.0.x
- Puppet >= 7.0.0 < 9.0.0
- RedHat, CentOS, OracleLinux, Scientific, SLES, Debian, Ubuntu, Fedora, Solaris, Windows, AIX, OSX, AlmaLinux, Rocky, AmazonLinux
Tasks:
- delete_local_filebucket
- facts_diff
- install
- version
Plans:
- run
Start using this module
Add this module to your Puppetfile:
mod 'puppetlabs-puppet_agent', '4.21.0'
Learn more about managing modules with a PuppetfileDocumentation
puppet_agent
Table of Contents
- puppet_agent
- [Table of Contents](#table-of-contents)
- Overview
- Module Description
- Setup
- Usage
- Using alternate sources
- Reference
- Public classes
- Private classes
- Parameters
- Class: puppet_agent
arch
collection
is_pe
manage_repo
package_version
service_names
source
absolute_source
yum_source
apt_source
mac_source
windows_source
solaris_source
aix_source
use_alternate_sources
alternate_pe_source
install_dir
disable_proxy
proxy
install_options
msi_move_locked_files
wait_for_pxp_agent_exit
wait_for_puppet_run
config
- Class: puppet_agent
- Plans
- Tasks
- Limitations
- Development
- Codeowners
Overview
A module for installing, running, upgrading, and managing the configuration of Puppet agents. Supports upgrading from Puppet 6 puppet-agent packages to later versions including Puppet 7 and Puppet 8.
Module Description
The puppet_agent module installs the appropriate official Puppet package repository (on systems that support repositories); migrates configuration required by Puppet to new locations used by puppet-agent; and installs the puppet-agent package, removing the previous Puppet installation.
If a package_version parameter is provided, it will ensure that puppet-agent version is installed. The package_version parameter is required to perform upgrades starting from a puppet-agent package, also this parameter can be set to "auto", ensuring that agent version matches the version on the master without having to manually update package_version after upgrading the master(s). On platforms that install packages through repos (EL, Fedora, Debian, Ubuntu, SLES), the parameter can be set to "latest" in order to install the latest available package. To only ensure the presence of the package, the parameter can be set to "present".
If a config parameter is provided, it will manage the defined agent configuration settings.
Setup
What puppet_agent affects
- Puppet, Facter, and Hiera.
- Puppet's SSL directory and puppet.conf.
- Removes deprecated settings from puppet.conf.
Setup requirements
Your agents must be running a minimum version of Puppet 6. They should already be pointed at a master running Puppet Server 6 or greater, and thus successfully applying catalogs compiled with the Puppet 6 or newer language.
Beginning with puppet_agent
Install the puppet_agent module with puppet module install puppetlabs-puppet_agent
.
Usage
Add the class to agents you want to upgrade, specifying the desired puppet-agent version:
class {'::puppet_agent':
package_version => '7.23.0',
}
This will ensure the version 7.23.0
of the puppet-agent package is installed.
Using alternate sources
In cases where you wish to download agents from sources other than the defaults you can use source parameters to change the location to grab packages from.
Public downloads mirrors
If you wish to mirror the Puppet public downloads sites (yum.puppet.com, apt.puppet.com, downloads.puppet.com) you can provide the following parameters to change the location of downloads:
yum_source
apt_source
mac_source
windows_source
solaris_source
aix_source
For AIX and Solaris packages: because AIX and Solaris are PE only you must use puppetlabs-pe_repo to create repos for these platforms on the PE master, then mirror the PE master package serve.
When working with a PE installation: if you set use_alternate_sources
to true
you can force agent downloads to come from downloads sites (or a mirror if you set the source parameters) rather than the PE master. WARNING This parameter will override the default settings in PE installations to download packages from the PE master. If you wish to continue to download from the PE master do not set this parameter.
Absolute paths to packages
If your packages are already available on the target system (for example if you are using a network share) you can provide absolute_source
the path to the packages to use during installation.
WARNING You must provide the full path, including the package name, for this parameter to work. This also means you cannot provide the same absolute_source
for two different types of packages.
Alternate PE master location
If you are using puppetlabs-pe_repo to serve packages, but want to provide a location other than the current master to serve packages: use alternate_pe_source
to specify a seperate location where packages are located in the same structure that would be on a PE master.
Reference
Public classes
Private classes
puppet_agent::install
: Installs packages.puppet_agent::osfamily::*
: Platform-specific preparation performed before upgrades.puppet_agent::prepare
: Prepares the agent for upgrade.puppet_agent::prepare::package
: Stages packages locally for install, on platforms that can't install from remote packages.puppet_agent::prepare::*
: Prepare various file configurations.puppet_agent::service
: Ensures the services are running.puppet_agent::windows::install
: Handles Windows package installation.
Parameters
Class: puppet_agent
arch
The architecture version you wish to install. Defaults to $facts['os']['architecture']
.
arch => 'x86_64'
collection
The Puppet Collection to track, should be a supported collection (e.g. puppet7
or puppet8
). Puppet collections contain the latest agents included in the collection's series, so puppet7
will pull in the most recent Puppet 5 release (for example: 7.23.0). This parameter is required for installations not connected to Puppet Enterprise
collection => 'puppet7'
is_pe
Install from Puppet Enterprise (PE) repos. Enabled if communicating with a PE master.
is_pe => true
manage_repo
Boolean to determine whether to configure zypper/yum/apt/solaris repositories. Defaults to true
.
If set to false, it is assumed an internally hosted repository will be used for the installation,
and the native package providers will be used to query pre-configured repos on the host being upgraded.
manage_repo => true
package_version
The package version to upgrade to. This must be explicitly specified.
package_version => '7.23.0'
or
package_version => 'auto'
or
package_version => 'latest'
or
package_version => 'present'
service_names
An array of services to start, normally puppet
. If the array is empty, no services are started.
service_names => ['puppet']
source
INCLUDED FOR COMPATIBILITY WITH MODULE VERSIONS 1.0/2.0. PREFER USE OF "absolute_source", "(yum/apt/mac etc.)_source", "alternate_pe_source" OVER USE OF "source".
The location to find packages. Replaces base URL for unix/MacOS agents, used as fully qualified path in windows.
Unix/MacOS
source => 'https://alternate-pe-master.com:8140'
Windows
source => 'C:/packages/puppet-agent-7.23.0-x64.msi'
absolute_source
Absolute ("fully qualified") source path from which you wish to download the latest version of Puppet. No path structure or package name is assumed: the fully qualified path to the package itself must be provided.
absolute_source => 'C:/packages/puppet-agent-7.23.0-x64.msi'
yum_source
Base URL of a location or mirrors of yum.puppet.com downloads sites. Directories under the URL should match the structure of yum.puppet.com
yum_source => 'https://my-puppet-yum-mirror.com'
apt_source
Base URL of a location or mirrors of apt.puppet.com downloads sites. Directories under the URL should match the structure of apt.puppet.com
apt_source => 'https://my-puppet-apt-mirror.com'
mac_source
Base URL of a location or mirrors of downloads.puppet.com downloads site that serves MacOS packages. Directories under the URL should match the structure of the downloads.puppet.com site
mac_source => 'https://my-puppet-downloads-mirror.com'
windows_source
URL of a location or mirrors of downloads.puppet.com downloads site that serves packages. Directories under the URL should match the structure of downloads.puppet.com site
windows_source => 'https://my-puppet-downloads-mirror.com'
solaris_source
Base URL of the location of a mirror for Solaris packages. Currently, solaris packages can only be made available by using puppetlabs-pe_repo. This means the mirror must be of a PE master package serve.
solaris_source => 'https://my-pe_master-mirror.com'
aix_source
Base URL of the location of a mirror for AIX packages. Currently, AIX packages can only be made available by using puppetlabs-pe_repo. This means the mirror must be of a PE master package serve.
aix_source => 'https://my-pe_master-mirror.com'
use_alternate_sources
ONLY APPLICABLE WHEN WORKING WITH PE INSTALLTIONS
When set to true will force downloads to come from the values of $apt_source, $deb_source $mac_source etc. rather than from the default PE master package serve. Note that this will also force downloads to ignore alternate_pe_source.
use_alternate_sources => true
alternate_pe_source
Base URL of a location where packages are located in the same structure that's served by a PE master (the directory structure in PE for serving packages is created by the puppetlabs-pe_repo module). The general structure served by PE is: /packages/${pe_server_version}/${platform_tag}/${package_name}
alternate_pe_source => 'https://my-alternate-pe-master.com:8140'
install_dir
The directory the puppet agent should be installed to. This is only applicable for Windows operating systems and when upgrading the agent to a new version; it will not cause re-installation of the same version to a new location. This must use backslashes for the path separator, and be an absolute path, for example:
install_dir => 'D:\Program Files\Puppet Labs'
disable_proxy
This setting controls whether or not the Puppet repositories are configured with proxies. Currently this is only supported on RedHat-based OSes.
disable_proxy => true
proxy
This setting specifies the proxy with which to configure the Puppet repos. Currently this is only supported on RedHat-based OSes.
proxy => 'http://myrepo-proxy.example.com'
install_options
An array of additional options to pass when installing puppet-agent. Each option in the array can be either a string or a hash. Each option is automatically quoted when passed to the install command.
With Windows packages, note that file paths in install_options
must use backslashes. (Since install options are passed directly to the installation command, forward slashes aren't automatically converted like they are in file
resources.) Backslashes in double-quoted strings must be escaped, while backslashes in single-quoted strings can be escaped. The default value for Windows packages is REINSTALLMODE="amus"
.
The full list of supported MSI properties can be found here.
The Puppet installer can disable the Windows path length limit (260 character MAX_PATH
limitation, requires Windows 10 1607 or later). This behavior is opt-in and can be controlled by the presence of the ENABLE_LONG_PATHS
install option (the value does not matter). (requires Puppet >= 6.25.0/7.10.0)
install_options => ['PUPPET_AGENT_ACCOUNT_DOMAIN=ExampleCorp', 'PUPPET_AGENT_ACCOUNT_USER=bob', 'PUPPET_AGENT_ACCOUNT_PASSWORD=password', 'ENABLE_LONG_PATHS=true']
For gMSAs, you must specify the domain and gMSA user, such as:
install_options => ['PUPPET_AGENT_ACCOUNT_DOMAIN=<AGENT_DOMAIN_NAME>', 'PUPPET_AGENT_ACCOUNT_USER=<gMSA_USER>']
msi_move_locked_files
This is only applicable for Windows operating systems and for Puppet 5 prior to 5.5.17 or Puppet 6 prior to 6.8.0. There may be instances where file locks cause unnecessary service restarts. By setting to true, the module will move files prior to installation that are known to cause file locks. By default this is set to false.
msi_move_locked_files => true
In case msi_move_locked_files
is set to true
while upgrading to Puppet 5 following 5.5.17 or Puppet 6 following 6.8.0, Puppet can get into a state where puppet --version
reports the older version(5.5.16) while the package reported by Windows is the new version(5.5.17). To recover from this case ADDLOCAL=ALL
must be added to install_options
install_options => ['REINSTALLMODE="amus"', 'ADDLOCAL=ALL']
wait_for_pxp_agent_exit
This is only applicable for Windows operating systems and pertains to /files/install_puppet.ps1 script. This parameterizes the module to define the wait time for the PXP agent to end successfully. The default value is 2 minutes and the timeout value must be defined in milliseconds. Example below, 8 minutes is equal to 480000.
wait_for_pxp_agent_exit => 480000
wait_for_puppet_run
This is only applicable for Windows operating systems and pertains to /files/install_puppet.ps1 script. This parameterizes the module to define the wait time for the current puppet agent run to end successfully. The default value is 2 minutes and the timeout value must be defined in milliseconds. Example below, 8 minutes is equal to 480000.
wait_for_puppet_run => 480000
config
An array of configuration data to enforce. Each configuration data item must be a Puppet_agent::Config hash, which has keys for puppet.conf section, setting, and value. This parameter is constrained to managing only a predetermined set of configuration settings. E.g. runinterval. The optional "ensure" key in a Puppet_agent::Config hash can be used to ensure a setting is absent. In the example below, the runinterval setting in the main section is set to 1 hour, and a local environment setting is ensured absent.
config => [{section => main, setting => runinterval, value => '1h'},
{section => main, setting => environment, ensure => absent}]
Valid agent settings are defined by the Puppet_agent::Config_setting
type alias.
Plans
puppet_agent::run
Starts a Puppet agent run on the specified targets.
Parameters
targets
: A list of targets to start the Puppet agent run on.
Return value
Returns a ResultSet
object. Targets that do not have an agent installed will have a failing
Result
object. For targets that have an agent installed and successfully ran the agent,
the Result
object will include the output of the agent run, the detailed exit code, and the
contents of the run report.
{
"_output": <output>,
"exitcode": <exitcode>,
"report": <report>
}
Tasks
puppet_agent::version
Checks for the version of puppet-agent package installed.
Return value
The puppet_agent::version
task returns a Result on success specifying the version of the agent installed and how it was detected.
{
"version": <version>,
"source": <source>
}
puppet_agent::install
Installs the puppet-agent package. This task should not be used for upgrading agents particularly Windows agents which have requirements other than just installing the puppet-agent msi.
For upgrading Windows agents please use the puppet_agent
class through your standard Puppet deployment or via Bolt with Puppet apply.
Note: The
puppet_agent::install_shell
task requires thefacts::bash
implementation from the facts module. Both thepuppet_agent
andfacts
modules are packaged with Bolt. For use outside of Bolt make sure thefacts
module is installed to the samemodules
directory aspuppet_agent
.
Return value
The task returns the output of the installation script.
puppet_agent::facts_diff
Executes puppet facts diff
action to check if there are differences between Facter 3 and Facter 4 outputs. (requires Puppet >= 6.21.0)
Parameters
exclude
: Regex used to exclude specific facts from diff. (requires Puppet >= 6.22.0)
Return value
Returns a ResultSet
object containing the differences.
{
"foo": {
"new_value": "bar",
"old_value": "baz"
}
}
puppet_agent::delete_local_filebucket
Removes the local filebucket cache. The location of the filebucket is determined using the clientbucketdir
puppet config.
Parameters
force
: ignore nonexistent files and errors.
Return value
Returns a ResultSet
object.
{:success=>true}
Limitations
Mac OS X/macOS open source packages are not supported in puppet_agent module releases prior to v2.1.0.
Known issues
Windows platforms:
-
To upgrade the agent by executing
puppet agent -t
interactively in a console, you must leave the console open and wait for the upgrade to finish before attempting to use thepuppet
command again. During upgrades the upgrade scripts use a 'pid file' located at Drive:\ProgramData\PuppetLabs\puppet\cache\state\puppet_agent_upgrade.pid to indicate there is an upgrade in progress. The 'pid file' also contains the process ID of the upgrade, if you wish to track the process itself. -
MSI installation failures do not produce any error. If the install fails, puppet_agent continues to be applied to the agent. If this happens, you'll need to examine the MSI log file to determine the failure's cause. You can find the location of the log file in the debug output from either a puppet apply or an agent run; the log file name follows the pattern
puppet-<timestamp>-installer.log
. -
If the upgrade is from Puppet 5 prior to 5.5.17 or Puppet 6 prior to 6.8.0 to newer version and
msi_move_locked_files
is set totrue
, Puppet can get into a state wherepuppet --version
reports the older version(5.5.16) while the package reported by Windows is the new version(5.5.17). To recover from this caseADDLOCAL=ALL
must be added to install_options
install_options => ['REINSTALLMODE="amus"', 'ADDLOCAL=ALL']
*NIX platforms:
- Upgrading on most *NIX platforms (Linux, AIX, Solaris 11) will end the run after the puppet-agent upgrade finishes. This is to avoid unexpected behavior if already loaded Ruby code happens to interact with newer code that came with the upgrade, or viceversa. If run as a daemon, Puppet will automatically start a new agent run after the upgrade finishes.
Development
Puppet, Inc. modules on the Puppet Forge are open projects, and community contributions are essential for keeping them great. We can’t access the huge number of platforms and myriad hardware, software, and deployment configurations that Puppet is intended to serve. We want to keep it as easy as possible to contribute changes so that our modules work in your environment. There are a few guidelines that we need contributors to follow so that we can have a chance of keeping on top of things. For more information, see our module contribution guide.
Codeowners
See CODEOWNERS
Reference
Table of Contents
Classes
puppet_agent
: Upgrades Puppet 4 and newer to the requested version.puppet_agent::configure
: Uses $puppet_agent::config to manage settings in puppet.conf.puppet_agent::install
: This class is called from puppet_agent for install.puppet_agent::install::darwin
: Manage the install process for Darwin OSes specifically.puppet_agent::install::solaris
: Manage the install process for Solaris OSes specifically.puppet_agent::install::suse
: Manage the install process for SUSE OSes specifically.puppet_agent::install::windows
: Manage the install process for Windows OSes specifically.puppet_agent::osfamily::aix
: Used to determine the puppet-agent package location for AIX OSes.puppet_agent::osfamily::darwin
: Used to determine the puppet-agent package location for Darwin OSes.puppet_agent::osfamily::debian
: Determines the puppet-agent package location for Debian OSes.puppet_agent::osfamily::redhat
: Determines the puppet-agent package location for RedHat OSes.puppet_agent::osfamily::solaris
: Determines the puppet-agent package location for Solaris OSes.puppet_agent::osfamily::suse
: Determines the puppet-agent package location for SUSE OSes.puppet_agent::osfamily::windows
: Determines the puppet-agent package location for Windows OSes.puppet_agent::params
: Sets variables according to platform.puppet_agent::prepare
: This class is called from puppet_agent to prepare for the upgrade.puppet_agent::prepare::package
: Ensures correct puppet-agent package is downloaded locally.puppet_agent::prepare::puppet_config
: Private class called from puppet_agent::prepare class.puppet_agent::service
: Ensures that managed services are running.
Resource types
puppet_agent_end_run
: Stops the current Puppet run if a puppet-agent upgrade was performed. Used on platforms that manage the Puppet Agent upgrade with a package rpuppet_agent_upgrade_error
: Fails when a previous background installation failed. The type will check for the existance of an installation failure log and raise an error
Functions
any_resources_of_type
: A function used to determine if there are anyuri_host_from_string
windows_msi_installargs
windows_native_path
Data types
Puppet_agent::Arch
: This type stores all possible architecture patternsPuppet_agent::Config
: This Puppet type aliasPuppet_agent::Config_setting
: An enumerated list of settings which are permitted to be managed by this module.
Tasks
delete_local_filebucket
: Removes the local filebucketfacts_diff
: Run the Puppet agent facts diff actioninstall
: Install the Puppet agent packageinstall_powershell
: Install the Puppet agent packageinstall_shell
: Install the Puppet agent packagerun
: Run the Puppet agent. This task may cause problems if run in Puppet Enterprise.version
: Get the version of the Puppet agent package installed. Returns nothing if none present.version_powershell
: Get the version of the Puppet agent package installed. Returns nothing if none present.version_shell
: Get the version of the Puppet agent package installed. Returns nothing if none present.
Plans
puppet_agent::run
: Starts a Puppet agent run on the specified targets. Note: This plan may cause issues when run in Puppet Enterprise.
Classes
puppet_agent
Upgrades Puppet 4 and newer to the requested version.
Parameters
The following parameters are available in the puppet_agent
class:
arch
collection
is_pe
manage_pki_dir
manage_repo
package_name
package_version
service_names
source
absolute_source
yum_source
apt_source
mac_source
windows_source
solaris_source
aix_source
use_alternate_sources
alternate_pe_source
install_dir
install_options
msi_move_locked_files
wait_for_pxp_agent_exit
wait_for_puppet_run
config
proxy
version_file_path
skip_if_unavailable
disable_proxy
arch
Data type: String
The package architecture. Defaults to the architecture fact.
Default value: $facts['os']['architecture']
collection
Data type: String
The Puppet Collection to track. Defaults to 'PC1'.
Default value: $puppet_agent::params::collection
is_pe
Data type: Boolean
Install from Puppet Enterprise repos. Enabled if communicating with a PE master.
Default value: $puppet_agent::params::_is_pe
manage_pki_dir
Data type: Boolean
Whether or not to manage the /etc/pki directory. Defaults to true. Managing the /etc/pki directory inside the puppet_agent module can be problematic for organizations that manage gpg keys and settings in other modules.
Default value: true
manage_repo
Data type: Boolean
Boolean to determine whether to configure repositories This is intended to provide the ability to disable configuring a local repo in support of systems that manage external repositories (i.e. spacewalk/satellite) to enable users to add the proper packages to their internal repos and to utilize default package providers for the install
Default value: true
package_name
Data type: String
The package to upgrade to, i.e. puppet-agent
.
Default value: 'puppet-agent'
package_version
Data type: Optional
The package version to upgrade to. Explicitly specify the version to upgrade to, or set to 'auto' to specify the version of the compiling master.
Default value: undef
service_names
Data type: Array
An array of services to start, normally puppet
.
None will be started if the array is empty.
Default value: $puppet_agent::params::service_names
source
Data type: Optional
INCLUDED FOR COMPATIBILITY WITH MODULE VERSIONS 1.0/2.0. PREFER USE OF "absolute_source", "apt_source", "deb_source" etc. OVER USE OF "source".
The location to find packages. Replaces base URL for unix/MacOS agents, used as fully qualified path in windows
Default value: undef
absolute_source
Data type: Optional
The exact location of the package to install. The entire path to the package must be provided with this parameter.
Default value: undef
yum_source
Data type: String
Base URL of the location of mirrors of yum.puppet.com downloads sites. Directories under the URL "yum_source" should match the structure of the yum.puppet.com
Default value: 'http://yum.puppet.com'
apt_source
Data type: String
Base URL of the location of mirrors of apt.puppet.com downloads sites. Directories under the URL "apt_source" should match the structure of the apt.puppet.com
Default value: 'https://apt.puppet.com'
mac_source
Data type: String
Base URL of the location of mirrors of downloads.puppet.com downloads site that serves MacOS packages. Directories under the URL "mac_source" should match the structure of the downloads.puppet.com site
Default value: 'https://downloads.puppet.com'
windows_source
Data type: String
Base URL of the location of mirrors of downloads.puppet.com downloads site that serves Windows packages. Directories under the URL "windows_source" should match the structure of the downloads.puppet.com site
Default value: 'https://downloads.puppet.com'
solaris_source
Data type: String
Base URL of the location of a mirror for Solaris packages. Currently, solaris packages can only be made available by using puppetlabs-pe_repo. This means the mirror must be of a PE master package serve.
Default value: 'puppet:///pe_packages'
aix_source
Data type: String
Base URL of the location of a mirror for AIX packages. Currently, AIX packages can only be made available by using puppetlabs-pe_repo. This means the mirror must be of a PE master package serve.
Default value: 'puppet:///pe_packages'
use_alternate_sources
Data type: Boolean
ONLY APPLICABLE WHEN WORKING WITH PE INSTALLTIONS When set to true will force downloads to come from the values of $apt_source, $deb_source $mac_source etc. rather than from the default PE master package serve. Note that this will also force downloads to ignore alternate_pe_source
Default value: false
alternate_pe_source
Data type: Optional
Base URL of the location where packages are located in the same structure that's served by a PE master (the directory structure in PE for serving packages is created by the puppetlabs-pe_repo module). The general structure served by PE is: /packages/${pe_server_version}/${platform_tag}/${package_name}
Default value: undef
install_dir
Data type: Optional[Stdlib::Absolutepath]
The directory the puppet agent should be installed to. This is only applicable for windows operating systems. This only applies when upgrading the agent to a new version; it will not cause re-installation of the same version to a new location.
Default value: undef
install_options
Data type: Array
An array of additional options to pass when installing puppet-agent. Each option in
the array can either be a string or a hash. Each option will automatically be quoted
when passed to the install command. With Windows packages, note that file paths in an
install option must use backslashes. (Since install options are passed directly to
the installation command, forward slashes won't be automatically converted like they
are in file
resources.) Note also that backslashes in double-quoted strings must
be escaped and backslashes in single-quoted strings can be escaped.
Default value: []
msi_move_locked_files
Data type: Boolean
This is only applicable for Windows operating systems. There may be instances where file locks cause unncessary service restarts. By setting to true, the module will move files prior to installation that are known to cause file locks.
Default value: false
wait_for_pxp_agent_exit
Data type: Optional
This parameter is only applicable for Windows operating systems and pertains to the /files/install_agent.ps1 script. This parameterizes the module to define the wait time for the PXP agent to end successfully. The default value is set 2 minutes.
Default value: undef
wait_for_puppet_run
Data type: Optional
This parameter is only applicable for Windows operating systems and pertains to the /files/install_agent.ps1 script. This parameterizes the module to define the wait time for the current puppet agent run to end successfully. The default value is set 2 minutes.
Default value: undef
config
Data type: Array[Puppet_agent::Config]
An array of configuration data to enforce. Each configuration data item must be a Puppet_agent::Config hash, which has keys for puppet.conf section, setting, and value. This parameter is constrained to managing only a predetermined set of configuration settings, e.g. runinterval.
Default value: []
proxy
Data type: Optional
This is to be able to configure yum-repo with proxy, needed for example for clients in DMZs that need to use proxy to reach the repo provided by puppetserver.
Default value: undef
version_file_path
Data type: Stdlib::Absolutepath
The default install path for the VERSION file
Default value: '/opt/puppetlabs/puppet/VERSION'
skip_if_unavailable
Data type: Variant[Boolean, String]
For yum-based repositories, set the skip_if_unavailable option of the yumrepo
type.
Default value: 'absent'
disable_proxy
Data type: Boolean
Default value: false
puppet_agent::configure
It does not require management of the agent package.
puppet_agent::install
This class is called from puppet_agent for install.
Parameters
The following parameters are available in the puppet_agent::install
class:
package_version
Data type: String
The puppet-agent version to install.
Default value: 'present'
install_dir
Data type: Optional[Stdlib::Absolutepath]
The directory the puppet agent should be installed to. This is only applicable for windows operating systems.
Default value: undef
install_options
Data type: Array[Variant[String, Hash]]
An array of additional options to pass when installing puppet-agent. Each option in
the array can either be a string or a hash. Each option will automatically be quoted
when passed to the install command. With Windows packages, note that file paths in an
install option must use backslashes. (Since install options are passed directly to
the installation command, forward slashes won't be automatically converted like they
are in file
resources.) Note also that backslashes in double-quoted strings must
be escaped and backslashes in single-quoted strings can be escaped.
Default value: []
puppet_agent::install::darwin
Private class called from puppet_agent class.
Parameters
The following parameters are available in the puppet_agent::install::darwin
class:
package_version
Data type: String
The puppet-agent version to install.
install_options
Data type: Array[Variant[String, Hash]]
An array of additional options to pass when installing puppet-agent. Each option in
the array can either be a string or a hash. Each option will automatically be quoted
when passed to the install command. With Windows packages, note that file paths in an
install option must use backslashes. (Since install options are passed directly to
the installation command, forward slashes won't be automatically converted like they
are in file
resources.) Note also that backslashes in double-quoted strings must
be escaped and backslashes in single-quoted strings can be escaped.
Default value: []
puppet_agent::install::solaris
Private class called from puppet_agent class.
Parameters
The following parameters are available in the puppet_agent::install::solaris
class:
package_version
Data type: String
The puppet-agent version to install.
install_options
Data type: Array[Variant[String, Hash]]
An array of additional options to pass when installing puppet-agent. Each option in
the array can either be a string or a hash. Each option will automatically be quoted
when passed to the install command. With Windows packages, note that file paths in an
install option must use backslashes. (Since install options are passed directly to
the installation command, forward slashes won't be automatically converted like they
are in file
resources.) Note also that backslashes in double-quoted strings must
be escaped and backslashes in single-quoted strings can be escaped.
Default value: []
puppet_agent::install::suse
Private class called from puppet_agent class.
Parameters
The following parameters are available in the puppet_agent::install::suse
class:
package_version
Data type: String
The puppet-agent version to install.
install_options
Data type: Array[Variant[String, Hash]]
An array of additional options to pass when installing puppet-agent.
Each option in the array can either be a string or a hash.
Each option will automatically be quoted when passed to the install command.
With Windows packages, note that file paths in an install option must use
backslashes. (Since install options are passed directly to the installation
command, forward slashes won't be automatically converted like they are in
file
resources.) Note also that backslashes in double-quoted strings
must be escaped and backslashes in single-quoted strings can be escaped.
Default value: []
puppet_agent::install::windows
Private class called from puppet_agent class.
Parameters
The following parameters are available in the puppet_agent::install::windows
class:
install_options
Data type: Array[Variant[String, Hash]]
An array of additional options to pass when installing puppet-agent. Each option in
the array can either be a string or a hash. Each option will automatically be quoted
when passed to the install command. With Windows packages, note that file paths in an
install option must use backslashes. (Since install options are passed directly to
the installation command, forward slashes won't be automatically converted like they
are in file
resources.) Note also that backslashes in double-quoted strings must
be escaped and backslashes in single-quoted strings can be escaped.
Default value: []
install_dir
Data type: Optional
The directory the puppet agent should be installed to. This is only applicable for windows operating systems.
Default value: undef
puppet_agent::osfamily::aix
Used to determine the puppet-agent package location for AIX OSes.
puppet_agent::osfamily::darwin
Used to determine the puppet-agent package location for Darwin OSes.
puppet_agent::osfamily::debian
Determines the puppet-agent package location for Debian OSes.
puppet_agent::osfamily::redhat
Determines the puppet-agent package location for RedHat OSes.
puppet_agent::osfamily::solaris
Determines the puppet-agent package location for Solaris OSes.
puppet_agent::osfamily::suse
Determines the puppet-agent package location for SUSE OSes.
puppet_agent::osfamily::windows
Determines the puppet-agent package location for Windows OSes.
puppet_agent::params
This class is meant to be called from puppet_agent.
puppet_agent::prepare
This class is called from puppet_agent to prepare for the upgrade.
Parameters
The following parameters are available in the puppet_agent::prepare
class:
package_version
Data type: Optional
The puppet-agent version to install.
Default value: undef
puppet_agent::prepare::package
for installation. This is used on platforms without package managers capable of working with a remote https repository.
Parameters
The following parameters are available in the puppet_agent::prepare::package
class:
source
Data type: Variant[String, Array]
The source file for the puppet-agent package. Can use any of the data types and protocols that the File resource's source attribute can.
puppet_agent::prepare::puppet_config
Private class called from puppet_agent::prepare class.
Parameters
The following parameters are available in the puppet_agent::prepare::puppet_config
class:
package_version
Data type: String
The puppet-agent version to install.
puppet_agent::service
This class is meant to be called from puppet_agent.
Resource types
puppet_agent_end_run
Stops the current Puppet run if a puppet-agent upgrade was performed. Used on platforms that manage the Puppet Agent upgrade with a package resource, as resources evaluated after an upgrade might cause unexpected behavior due to a mix of old and new Ruby code being loaded in memory.
Platforms that shell out to external scripts for upgrading (Windows, macOS, and Solaris 10) do not need to use this type.
Properties
The following properties are available in the puppet_agent_end_run
type.
end_run
Stops the current puppet run
Parameters
The following parameters are available in the puppet_agent_end_run
type.
name
namevar
The desired puppet-agent version
provider
The specific backend to use for this puppet_agent_end_run
resource. You will seldom need to specify this --- Puppet
will usually discover the appropriate provider for your platform.
puppet_agent_upgrade_error
Fails when a previous background installation failed. The type will check for the existance of an installation failure log and raise an error with the contents of the log if it exists
Properties
The following properties are available in the puppet_agent_upgrade_error
type.
ensure_notexist
whether or not the error log exists
Parameters
The following parameters are available in the puppet_agent_upgrade_error
type.
name
namevar
The name of the failure log to check for in puppet's $statedir. If this log exists the resource will fail.
provider
The specific backend to use for this puppet_agent_upgrade_error
resource. You will seldom need to specify this ---
Puppet will usually discover the appropriate provider for your platform.
Functions
any_resources_of_type
Type: Ruby 4.x API
Puppet::Parser::Resource instances of the passed in resource type
any_resources_of_type(String $resource_type, Optional[Hash[Any, Any]] $parameters)
Puppet::Parser::Resource instances of the passed in resource type
Returns: Boolean
Whether there are any instances of resource_type
resource_type
Data type: String
Resource type that is being looked for
parameters
Data type: Optional[Hash[Any, Any]]
Optional parameters
uri_host_from_string
Type: Ruby 3.x API
The uri_host_from_string function.
uri_host_from_string()
The uri_host_from_string function.
Returns: Any
Return a uri host from a string
windows_msi_installargs
Type: Ruby 3.x API
The windows_msi_installargs function.
windows_msi_installargs()
The windows_msi_installargs function.
Returns: String
Return the $install_options parameter as a string usable in an msiexec command
windows_native_path
Type: Ruby 3.x API
The windows_native_path function.
windows_native_path()
The windows_native_path function.
Returns: Any
Return a windows native path
Data types
Puppet_agent::Arch
This type stores all possible architecture patterns
Alias of Pattern[/^x86$/, /^x64$/, /^i386$/, /^i86pc$/, /^amd64$/, /^x86_64$/, /^power$/, /^sun4[uv]$/, /^ppc64le$/, /^aarch64$/, /PowerPC_POWER/]
Puppet_agent::Config
This Puppet type alias
Alias of
Variant[Struct[{ section => Enum[main, server, agent, user, master],
setting => Puppet_agent::Config_setting,
value => String,
Optional[ensure] => Enum[present, absent] }], Struct[{ section => Enum[main, server, agent, user, master],
setting => Puppet_agent::Config_setting,
Optional[ensure] => Enum[absent] }]]
Puppet_agent::Config_setting
An enumerated list of settings which are permitted to be managed by this module.
Alias of Enum[agent_catalog_run_lockfile, agent_disabled_lockfile, allow_duplicate_certs, allow_pson_serialization, always_retry_plugins, autoflush, autosign, basemodulepath, binder_config, bucketdir, ca_fingerprint, ca_name, ca_port, ca_refresh_interval, ca_server, ca_ttl, cacert, cacrl, cadir, cakey, capub, catalog_cache_terminus, catalog_terminus, cert_inventory, certdir, certificate_revocation, certname, ciphers, classfile, client_datadir, clientbucketdir, clientyamldir, code, codedir, color, confdir, config, config_file_name, config_version, configprint, crl_refresh_interval, csr_attributes, csrdir, daemonize, data_binding_terminus, default_file_terminus, default_manifest, default_schedules, deviceconfdir, deviceconfig, devicedir, diff, diff_args, digest_algorithm, disable_i18n, disable_per_environment_manifest, disable_warnings, dns_alt_names, document_all, environment, environment_data_provider, environment_timeout, environment_timeout_mode, environmentpath, evaltrace, exclude_unchanged_resources, external_nodes, fact_name_length_soft_limit, fact_value_length_soft_limit, facterng, factpath, facts_terminus, fileserverconfig, filetimeout, forge_authorization, freeze_main, func3x_check, future_features, genconfig, genmanifest, graph, graphdir, group, hiera_config, hostcert, hostcert_renewal_interval, hostcrl, hostcsr, hostprivkey, hostpubkey, http_connect_timeout, http_debug, http_extra_headers, http_keepalive_timeout, http_proxy_host, http_proxy_password, http_proxy_port, http_proxy_user, http_read_timeout, http_user_agent, ignore_plugin_errors, ignoremissingtypes, ignoreschedules, include_legacy_facts, key_type, keylength, lastrunfile, lastrunreport, ldapattrs, ldapbase, ldapclassattrs, ldapparentattr, ldappassword, ldapport, ldapserver, ldapssl, ldapstackedattrs, ldapstring, ldaptls, ldapuser, libdir, localcacert, localedest, localesource, location_trusted, log_level, logdest, logdir, manage_internal_file_permissions, manifest, masterport, max_deprecations, max_errors, max_warnings, maximum_uid, maxwaitforcert, maxwaitforlock, merge_dependency_warnings, mkusers, module_groups, module_repository, module_working_dir, modulepath, name, named_curve, no_proxy, node_cache_terminus, node_name, node_name_fact, node_name_value, node_terminus, noop, number_of_facts_soft_limit, onetime, passfile, path, payload_soft_limit, pidfile, plugindest, pluginfactdest, pluginfactsource, pluginsignore, pluginsource, pluginsync, postrun_command, preferred_serialization_format, preprocess_deferred, prerun_command, preview_outputdir, priority, privatedir, privatekeydir, profile, publicdir, publickeydir, puppet_trace, puppetdlog, report, report_configured_environmentpath, report_include_system_store, report_port, report_server, reportdir, reports, reporturl, requestdir, resourcefile, rest_authconfig, resubmit_facts, rich_data, route_file, rundir, runinterval, runtimeout, serial, server, server_datadir, server_list, serverport, settings_catalog, show_diff, signeddir, skip_tags, sourceaddress, splay, splaylimit, srv_domain, ssl_client_ca_auth, ssl_client_header, ssl_client_verify_header, ssl_lockfile, ssl_server_ca_auth, ssl_trust_store, ssldir, statedir, statefile, statettl, static_catalogs, storeconfigs, storeconfigs_backend, strict, strict_environment_mode, strict_hostname_checking, strict_variables, summarize, supported_checksum_types, syslogfacility, tags, tasks, top_level_facts_soft_limit, trace, transactionstorefile, trusted_external_command, trusted_oid_mapping_file, use_cached_catalog, use_last_environment, use_srv_records, usecacheonfailure, user, vardir, vendormoduledir, versioned_environment_dirs, waitforcert, waitforlock, write_catalog_summary, yamldir]
Tasks
delete_local_filebucket
Removes the local filebucket
Supports noop? false
Parameters
force
Data type: Optional[Boolean]
ignore nonexistent files and errors
facts_diff
Run the Puppet agent facts diff action
Supports noop? false
Parameters
exclude
Data type: Optional[String]
Regex used to exclude specific facts from diff
install
Install the Puppet agent package
Supports noop? true
Parameters
version
Data type: Optional[String]
The version of puppet-agent to install (defaults to latest when no agent is installed)
collection
Data type: Optional[Enum[puppet7, puppet8, puppet, puppet7-nightly, puppet8-nightly, puppet-nightly]]
The Puppet collection to install from (defaults to puppet, which maps to the latest collection released)
absolute_source
Data type: Optional[String]
The absolute source location to find the Puppet agent package
yum_source
Data type: Optional[String]
The source location to find yum repos (defaults to yum.puppet.com)
apt_source
Data type: Optional[String]
The source location to find apt repos (defaults to apt.puppet.com)
mac_source
Data type: Optional[String]
The source location to find mac packages (defaults to downloads.puppet.com)
windows_source
Data type: Optional[String]
The source location to find windows packages (defaults to downloads.puppet.com)
install_options
Data type: Optional[String]
optional install arguments to the windows installer (defaults to REINSTALLMODE="amus")
stop_service
Data type: Optional[Boolean]
Whether to stop the puppet agent service after install
retry
Data type: Optional[Integer]
The number of retries in case of network connectivity failures
install_powershell
Install the Puppet agent package
Supports noop? true
Parameters
version
Data type: Optional[String]
The version of puppet-agent to install
collection
Data type: Optional[Enum[puppet7, puppet8, puppet, puppet7-nightly, puppet8-nightly, puppet-nightly]]
The Puppet collection to install from (defaults to puppet, which maps to the latest collection released)
absolute_source
Data type: Optional[String]
The absolute source location to find the Puppet agent package
yum_source
Data type: Optional[String]
The source location to find yum repos (defaults to yum.puppet.com)
apt_source
Data type: Optional[String]
The source location to find apt repos (defaults to apt.puppet.com)
mac_source
Data type: Optional[String]
The source location to find mac packages (defaults to downloads.puppet.com)
windows_source
Data type: Optional[String]
The source location to find windows packages (defaults to downloads.puppet.com)
install_options
Data type: Optional[String]
optional install arguments to the windows installer (defaults to REINSTALLMODE="amus")
stop_service
Data type: Optional[Boolean]
Whether to stop the puppet agent service after install
retry
Data type: Optional[Integer]
The number of retries in case of network connectivity failures
install_shell
Install the Puppet agent package
Supports noop? true
Parameters
version
Data type: Optional[String]
The version of puppet-agent to install
collection
Data type: Optional[Enum[puppet7, puppet8, puppet, puppet7-nightly, puppet8-nightly, puppet-nightly]]
The Puppet collection to install from (defaults to puppet, which maps to the latest collection released)
absolute_source
Data type: Optional[String]
The absolute source location to find the Puppet agent package
yum_source
Data type: Optional[String]
The source location to find yum repos (defaults to yum.puppet.com)
apt_source
Data type: Optional[String]
The source location to find apt repos (defaults to apt.puppet.com)
mac_source
Data type: Optional[String]
The source location to find mac packages (defaults to downloads.puppet.com)
windows_source
Data type: Optional[String]
The source location to find windows packages (defaults to downloads.puppet.com)
install_options
Data type: Optional[String]
optional install arguments to the windows installer (defaults to REINSTALLMODE="amus")
stop_service
Data type: Optional[Boolean]
Whether to stop the puppet agent service after install
retry
Data type: Optional[Integer]
The number of retries in case of network connectivity failures
run
Run the Puppet agent. This task may cause problems if run in Puppet Enterprise.
Supports noop? false
Parameters
noop
Data type: Boolean
run the puppet agent with --noop
environment
Data type: Optional[String[1]]
The desired puppet code environment to use
version
Get the version of the Puppet agent package installed. Returns nothing if none present.
Supports noop? false
version_powershell
Get the version of the Puppet agent package installed. Returns nothing if none present.
Supports noop? false
version_shell
Get the version of the Puppet agent package installed. Returns nothing if none present.
Supports noop? false
Plans
puppet_agent::run
Starts a Puppet agent run on the specified targets. Note: This plan may cause issues when run in Puppet Enterprise.
Parameters
The following parameters are available in the puppet_agent::run
plan:
targets
Data type: TargetSpec
The targets to start a Puppet agent run on.
noop
Data type: Boolean
if true, all runs will use --noop
Default value: false
environment
Data type: Optional[String[1]]
the desired puppet code environment
Default value: undef
What are tasks?
Modules can contain tasks that take action outside of a desired state managed by Puppet. It’s perfect for troubleshooting or deploying one-off changes, distributing scripts to run across your infrastructure, or automating changes that need to happen in a particular order as part of an application deployment.
Tasks in this module release
version
Get the version of the Puppet agent package installed. Returns nothing if none present.
What are plans?
Modules can contain plans that take action outside of a desired state managed by Puppet. It’s perfect for troubleshooting or deploying one-off changes, distributing scripts to run across your infrastructure, or automating changes that need to happen in a particular order as part of an application deployment.
Changelog
All notable changes to this project will be documented in this file.
The format is based on Keep a Changelog and this project adheres to Semantic Versioning.
v4.21.0 - 2024-09-25
Added
- (PA-6416) Support installing puppet-agent on Ubuntu 24.04 amd64/aarch64 #723 (shubhamshinde360)
- (MODULES-9695) Debian: use modern APT keyring format #681 (kenyon)
Fixed
- (PA-6677) Restore AL2 x86_64 install task and manifest #724 (joshcooper)
- (PA-6277) change manifests for amazon 2 repo #722 (imaqsood)
v4.20.1 - 2024-06-03
v4.20.0 - 2024-05-28
Added
- Support rpm platforms without yum #717 (h0tw1r3)
- (PA-5319) Add RedHat 9 (Power9) to the puppet_agent module task #715 (skyamgarp)
Fixed
- puppet_agent::run: properly validate environment parameter #714 (bastelfreak)
- Fix strftime() deprecation warning #712 (smortex)
- Add GPG check to SUSE repository #709 (mhashizume)
v4.19.0 - 2024-03-06
Added
- [Fix #703] use 'type' instead of 'which' for increased portability #704 (zbentley)
- support download with python3 urllib.request #702 (h0tw1r3)
- Add Debian 12 bookworm support #698 (h0tw1r3)
- support download with perl file::fetch #697 (h0tw1r3)
v4.18.0 - 2024-01-10
Added
- [PE-37297]: Added support for amazon 2023 in redhat.pp manifest file #692 (span786)
- (PA-5893) Update the task acceptance tests for macOS 14 (Intel) #691 (imaqsood)
- (PA-5581) Add Amazon Linux 2023 (Intel and ARM) to the puppet_agent m… #690 (shubhamshinde360)
- (PE-37302) Update puppet_agent module for recent AIX changes in PE #689 (amitkarsale)
v4.17.0 - 2023-12-08
Added
Fixed
- (maint) Unnest module and class names in Ruby tasks #687 (MartyEwings)
v4.16.0 - 2023-11-15
Added
- (PA-5065) Add Ubuntu 22.04 (ARM64) to the puppet_agent module #676 (imaqsood)
- (PA-5013) Add Red Hat 9 (ARM64) to the puppet_agent module task #675 (skyamgarp)
- (PA-5266) Change checksum algorithm to SHA256 #670 (mhashizume)
Fixed
- (PA-5826) Only read Windows VERSION file during puppet apply #677 (joshcooper)
- (PA-5820) Correct parameter types #673 (mhashizume)
- Match allowed datatypes to yumrepo skip_if_unavailable support #672 (seanmil)
- (maint) Update optional parameters #671 (mhashizume)
v4.15.0 - 2023-09-20
Added
- (PA-5721) Add puppet8 and drop puppet5 support from AIX #666 (joshcooper)
- (maint) PDK Update 2.7.5 #663 (AriaXLi)
- (PA-5309) Add macOS 13 (ARM) to the puppet_agent module task #659 (skyamgarp)
- Implement stdlib 9 compatibility #657 (bastelfreak)
- (PA-5337) PE integration #654 (mhashizume)
v4.14.0 - 2023-04-28
Added
- (PA-5336) Update tests and tasks for puppet8 #650 (mhashizume)
v4.13.0 - 2023-03-21
Added
- (PA-5242) Updates install tasks for puppet8 #642 (mhashizume)
- (MODULES-11365) Enable rspec tests on Ruby 3.2 #641 (mhashizume)
- (MODULES-11392) Add Puppet 7 to 8 upgrade test #639 (mhashizume)
- (MODULES-11361) Updates legacy facts #637 (mhashizume)
- (MODULES-11361) Puppet 8 compatibility work #636 (mhashizume)
- (MODULES-11348) Replace lsbdistcodename with os.distro.codename #634 (AriaXLi)
- run task/plan: Allow noop and environment option #632 (bastelfreak)
- (maint) replace legacy validate function with datatype #628 (bastelfreak)
- (MODULES-11346) Update dependency for APT module #624 (MartyEwings)
- (FM-8983) Add Fedora 36 #619 (joshcooper)
- Support for Linux Mint 21 #616 (luckyraul)
- (FM-8969) Add support for macOS 12 ARM #615 (joshcooper)
- Add support for absolute_source in puppet_agent::install task #484 (scbjans)
v4.12.1 - 2022-07-13
Fixed
v4.12.0 - 2022-07-13
Added
- (FM-8943) Add Ubuntu 22.04 to puppet_agent module #610 (AriaXLi)
- (FM-8943) Enable to install from nightly repo for Ubuntu 22.04 for task beaker tests #609 (AriaXLi)
- (FM-8943) Enable to install from nightly repo for Ubuntu 22.04 for task beaker tests #608 (AriaXLi)
- (maint) Adds cases for newly-supported OSes #607 (mhashizume)
Fixed
v4.11.0 - 2022-05-13
Added
- (maint) Add macOS 12 #602 (joshcooper)
Fixed
- (MODULES-11315) Updates AIO auto version logic #604 (mhashizume)
- DOC-5213 install_options for gMSAs #601 (aimurphy)
v4.10.0 - 2022-01-26
Added
- (maint). Add fact-limit configuration options to list. #584 (Heidistein)
- (MODULES-11192)(MODULES-11168) Add AlmaLinux and Rocky to the puppet-agent module #583 (BobosilaVictor)
- (IAC-1751/IAC-1753) Add Rocky and AlmaLinux support to the install agent task #582 (david22swan)
- Allow detection of non-AIO Puppet #581 (smortex)
Fixed
- (MODULES-11214) Wrong url generated for darwin 11 #586 (BobosilaVictor)
4.9.0 - 2021-09-09
Other
- (MODULES-11175) Release prep for 4.9.0 #580 (GabrielNagy)
- (maint) Update GPG-KEY-puppet #579 (GabrielNagy)
- (maint) set
aio_agent_version
for consistency #578 (gimmyxd) - (MODULES-11123) Avoid loading puppet facts in
install/windows.pp
#577 (luchihoratiu) - (maint) Allow stdlib 8.0.0 #576 (smortex)
- (MODULES-11060) Add Debian 11 to puppet_agent module #575 (Dorin-Pleava)
- (MODULES-11148) Document Windows long paths support #573 (GabrielNagy)
- (MODULES-11060) Add Debian 11 testing support to install task #572 (ciprianbadescu)
- (MODULES-11135) puppet_agent : Add task support for Rocky Linux 8.4 Green Obsidian #571 (Guillaume001)
- (maint) set
BEAKER_BOLT_VERSION
intask_acceptance
rake task #570 (ciprianbadescu) - (MODULES-11077) Allow all settings to be managed #569 (GabrielNagy)
- (MODULES-11112) Add parameter puppet_agent::proxy #567 (GabrielNagy)
- (MODULES-11078) Bump Bolt to 3.x #566 (beechtom)
- (MODULES-11113) Allow present and latest as package version #565 (relearnshuffle)
- (maint) Update readme for clarification on Windows agent updates #502 (murdok5)
4.8.0 - 2021-06-23
Other
- (maint) 4.8.0 release prep #568 (beechtom)
- (MODULES-11085) Add Fedora 34 x86_64 to puppet_agent module #564 (BobosilaVictor)
- (maint) increase winrm connection timeout #563 (gimmyxd)
- (MODULES-11074) Fix
facts_diff
task argument parsing on Windows #561 (luchihoratiu) - (PE-31118) add MacOS 11 support #560 (ciprianbadescu)
4.7.0 - 2021-05-12
Other
4.6.1 - 2021-04-27
Other
- (maint) 4.6.1 release preparation #558 (ciprianbadescu)
- (MODULES-11057) avoid temporary file execution #557 (ciprianbadescu)
- (maint) Update table of contents with new tasks/params #556 (GabrielNagy)
4.6.0 - 2021-04-22
Other
- (MODULES-11046) Release prep for 4.6.0 #555 (GabrielNagy)
- (maint) lock to ruby 2.5.8 to avoid segmentation fault #554 (gimmyxd)
- (maint) update tasks documentation #553 (gimmyxd)
- (MODULES-11045) add
exclude
parameter tofacts_diff
task #552 (ciprianbadescu) - (MODULES-10996) Fix SLES 11 PE upgrades #551 (GabrielNagy)
- (MODULES-11048) task to remove local filebucket #550 (gimmyxd)
- (MODULES-10989) Remove puppet5 collection #549 (lucywyman)
- (MODULES-10987) Add Fedora 32 to puppet_agent module #548 (BobosilaVictor)
4.5.0 - 2021-03-23
Other
- (MODULES-10979) Release prep for 4.5.0 #547 (GabrielNagy)
- (MODULES-10925) Added facts_diff task #542 (gimmyxd)
- (MODULES-10945) Module spring cleaning 2021 #541 (GabrielNagy)
- Do not include the .git directory in module packages #540 (smortex)
- Fix upgrading Puppet on windows #539 (smortex)
- (maint) Update puppet6 branch name for acceptance tests #538 (GabrielNagy)
- (MODULES-9798) Add Timeout Parameter for the Current Puppet Run #537 (phil4business)
- (MODULES-10909) Commands retry on network connectivity failures #536 (adrianiurca)
- (maint) Add code of conduct #535 (beechtom)
- (MODULES-10879) Implement configuration management #525 (reidmv)
4.4.0 - 2021-01-20
Other
- (MODULES-10919) Release prep for 4.4.0 #534 (GabrielNagy)
- (MODULES-10897) Fix GPG key typo #532 (GabrielNagy)
- (maint) update apt to 7.4.2 for unit tests #531 (gimmyxd)
- (MODULES-10897) Add new GPG signing key and remove the old one #530 (GabrielNagy)
- (MODULES-10910) Default to puppet 7 for PE 2021.0 #529 (genebean)
4.3.0 - 2020-12-16
Other
- (MODULES-10890) Release prep for 4.3.0 #528 (GabrielNagy)
- (MODULES-10878) Use correct packages when upgrading AIX #527 (GabrielNagy)
- (MODULES-10873) Add support for puppet7 collection #524 (joshcooper)
- (maint) Allow git to use long paths in GitHub Actions #523 (luchihoratiu)
- (maint) use rspec-expectations < 3.10 #522 (gimmyxd)
4.2.0 - 2020-10-30
Other
- (MODULES-10840) Release prep for 4.2.0 #521 (GabrielNagy)
- (MODULES-10851) Fix Windows nightly prerequisites check #520 (GabrielNagy)
- (MODULES-10850) determine PSScriptRoot if it does not exist #519 (mihaibuzgau)
- (MODULES-10815) Add Slack notification job #518 (luchihoratiu)
- (MODULES-10818) update README with msi_move_locked_files updates/details #517 (ciprianbadescu)
- (MODULES-10822) Rework acceptance tests #516 (GabrielNagy)
- (MODULES-10818) ignore
msi_move_locked_files
on newer puppet versions #515 (ciprianbadescu) - (maint) Fix commits rake task and speed up unit tests run on Windows GitHub Actions #514 (luchihoratiu)
- (maint) Bump puppet agent version used in acceptance tests and fix them #513 (luchihoratiu)
- (MODULES-10813) Mismatched versions stops install #512 (Dorin-Pleava)
- (MODULES-10799) Ensure upgradability from puppet 6 to 7 when remote filebuckets are enabled #511 (GabrielNagy)
- (MODULES-10780) PA 6 to PA 7 upgrade tests #510 (Dorin-Pleava)
- (MODULES-10806) Add Github Actions workflows #509 (luchihoratiu)
4.1.1 - 2020-08-24
Other
4.1.0 - 2020-08-20
Other
- (maint) Release prep for 4.1.0 #506 (lucywyman)
- (MODULES-10768) Add task and plan for running Puppet agent #503 (beechtom)
- (MODULES-10739) add task support for puppet7-nightly #501 (gimmyxd)
- Support for Linux Mint 20, LDME 4 #500 (luckyraul)
- (MODULES-10713) Fix agent upgrade on Solaris 11 #499 (GabrielNagy)
- (maint) update CODEOWNERS #490 (gimmyxd)
4.0.0 - 2020-06-16
Other
- (MODULES-10695) Release prep for 4.0.0 #498 (GabrielNagy)
- (MODULES-10666) Stop agent run after an upgrade #496 (GabrielNagy)
- (MODULES-10673) Update dependency for puppetlabs-facts #495 (Dorin-Pleava)
- (MODULES-10653) Failed to upgrade agent using puppet task #494 (luchihoratiu)
- (maint) bump agent version in tests #493 (gimmyxd)
- (MODULES-10655) Fix up/downgrade of agent to specified version #488 (hajee)
3.2.0 - 2020-05-13
Other
- (MODULES-10668) Release prep for 3.2.0 #492 (beechtom)
- (MODULE-10662) Add Ubuntu 20.04 to puppet_agent::install task #491 (beechtom)
- (MODULES-10651) Add ubuntu 20.04 support #489 (gimmyxd)
- (MODULES-10661) Add OS X 10.15 support #487 (GabrielNagy)
- (MODULES-10633) Don't use the install task for upgrades #486 (npwalker)
- (MODULES-10636) Fixed mcollective being included as a default service to manage, in clientversion >= 6.0.0 #485 (LinkMJB)
3.1.0 - 2020-04-06
Other
- (maint) Fix mco acceptance testing #482 (GabrielNagy)
- (MODULES-10607) Release prep for 3.1.0 #481 (GabrielNagy)
- (maint) Fix task acceptance for osx 10.14 & 10.15 #480 (GabrielNagy)
- (MODULES-10606) fix windowsfips upgrades #479 (gimmyxd)
- (MODULES-10594) Remove pidlock if service states cannot be restored #478 (mihaibuzgau)
- (packaging) Update inifile dependency to allow all 4.x versions #477 (MikaelSmith)
- (MODULES-10110) Handle Amazon Linux 2 as el-7 #476 (mihaibuzgau)
- Check that user is root only if installation is required #475 (faucct)
- (MODULES-10589) Exit early when puppet.list config file has been modified #472 (beechtom)
- (maint) Allow install task to downlad macos 10.15 #471 (donoghuc)
3.0.2 - 2020-02-14
Other
- (maint) Prep 3.0.2 #470 (beechtom)
- (maint) Remove config field from bolt_plugin.json #469 (beechtom)
3.0.1 - 2020-01-29
Other
- (maint) Prepare 3.0.1 release #468 (beechtom)
- (MODULES-10514) Remove use of version_powershell task in install task #467 (beechtom)
3.0.0 - 2020-01-27
Other
- (maint) Prepare 3.0.0 release #466 (beechtom)
- (MODULES-10477) Update task documentation #465 (beechtom)
- (maint) fix Solaris tests #464 (gimmyxd)
- (MODULES-10454) Install 'latest' only when no agent is present #463 (beechtom)
2.2.3 - 2019-12-11
Other
- Revert "(MODULES-10308) Allow downgrades when using apt" #459 (gimmyxd)
- (maint) Prepare 2.2.3 release #458 (Dorin-Pleava)
- (MODULES-10308) Allow downgrades when using apt #457 (beechtom)
- (MODULES-10238) Add Fedora 31 to puppet_agent module #456 (luchihoratiu)
- (MODULES-10067) enhance perl download check #455 (ciprianbadescu)
- (maint) Merge release to master #453 (Dorin-Pleava)
- (MODULES-10055) fix linter-errors in puppetlabs/puppet_agent #451 (kaessert)
- (maint) Updated metadata.json with support for Windows Server 2019 #449 (sootysec)
- (MODULES-27043) Puppet agent upgrade for windows FIPS #448 (Dorin-Pleava)
- (MODULES-10052) parameterize WaitForExit timeout in puppet_agent install script #436 (lucaswyoung)
2.2.2 - 2019-11-07
Other
- (maint) Prepare 2.2.2 release #452 (Dorin-Pleava)
- (MODULES-10038) nightly build download location fix #450 (Dorin-Pleava)
- (maint) Pin puppet-lint to 2.3.6 #447 (Dorin-Pleava)
2.2.1 - 2019-10-22
Other
- (maint) Release prep for 2.2.1 #446 (Dorin-Pleava)
- (maint) Make the puppet_agent task available as a plugin #445 (adreyer)
- (MODULES-9981) Add Amazon Linux 2 support #444 (alex-harvey-z3q)
- (maint) fix failing tests due to rspec changes #443 (gimmyxd)
- (maint) Add task to check commit messages #442 (gimmyxd)
- (maint) Add bolt team as codeowners for task content #440 (donoghuc)
- (maint) Update bash implementation metadata to require facts implemen… #439 (donoghuc)
- (GH-1204) Add option to stop the puppet agent service after install #438 (lucywyman)
- (MODULES-9846) fix install using cached catalog #437 (ciprianbadescu)
- Linux Mint Support #434 (luckyraul)
- (MODULES-9698) Update facts module used for testing install task #433 (donoghuc)
- (PE-25814) Add Debian 10 Buster amd64 to puppet agent module #431 (GeorgeMrejea)
- (MODULES-9497) install_puppet.ps1 stale .pid file #430 (Dorin-Pleava)
- Update metadata versions #428 (pillarsdotnet)
2.2.0 - 2019-08-05
Other
- (maint) Release prep for 2.2.0 #429 (alexandru-d-popa)
- (MODULES-7760) relax agent versions on redhat #426 (gimmyxd)
- (MODULES-9575) fix solaris 10 tests #425 (gimmyxd)
- (PE-26530) Update spec and task acceptance tests with Fedora 30 #424 (GabrielNagy)
- (PE-26530) Update metadata to add Fedora 30 #423 (GabrielNagy)
- (maint) Add CODEOWNERS #422 (mihaibuzgau)
- (MODULES-9444) Migrate puppet_agent module to Beaker 4 #421 (oanatmaria)
- (maint) Allow stdlib 6.x #418 (rnelson0)
- (MODULES-9173) Mcollective service restarting when PA upgrade is done. #417 (alexandru-d-popa)
- (MODULES-8923) puppet_agent : could autodetect package_version based … #416 (oanatmaria)
- (maint) Use newer puppet versions for class_spec #413 (oanatmaria)
- (maint) Fix tests on SLES #412 (oanatmaria)
- (maint) Fix task acceptance tests for fedora 29 #411 (donoghuc)
- (MODULES-8923) autodetect package_version based upon the master #401 (tkishel)
- (docs) Revise macOS limitations note. #398 (gguillotte)
- Readme naming consistency #396 (hpcprofessional)
- (MODULES-8665) Add missing puppetlabs-facts dependency #388 (Sharpie)
2.1.2 - 2019-05-13
Other
- (packaging) Update changelog/metadata for 2.1.2 #410 (mihaibuzgau)
- (maint) update apt url #409 (mihaibuzgau)
- (maint) Puppet agent on Windows has manual startup, debian spec fix #408 (sebastian-miclea)
- (maint) use PC1 as default #407 (mihaibuzgau)
- (maint) Changes to windows public release package links #405 (sebastian-miclea)
- (packaging) Update changelog/metadata for 2.1.2 #404 (sebastian-miclea)
- (docs) Fix bad aix_source example. #403 (gguillotte)
- (RE-12326) Changes to public release package links #402 (eimlav)
- Fix Yum URL path for RedHat systems still using the PC1 collection #400 (coreone)
2.1.1 - 2019-03-28
Other
- (MODULES-8821) Update win install to use production environment #397 (mcdonaldseanp)
2.1.0 - 2019-03-26
Other
- (MODULES-6604) Add new source parameters #395 (mcdonaldseanp)
- (MODULES-8720) Update source calculation to prefer source user param #394 (mcdonaldseanp)
- (MODULES-8554) Add error reporting for background upgrades #393 (mcdonaldseanp)
- Fix unnecessary changes in load balanced envs due to pkg source #392 (ragnarkon)
- (PA-2385) Update service management to run always for windows #391 (mcdonaldseanp)
- (FM-7628) Update install_puppet.ps1 to catch hanging pxp-agent processes #390 (mcdonaldseanp)
- (BOLT-1057) Pass required args to run_task #389 (nicklewis)
- (MODULES-4780) README improvements #387 (ScottGarman)
- (MODULES-8583) Improve rpm importing of the puppet GPG key #386 (ScottGarman)
- (MODULES-8599) Refactor sources and enable Darwin FOSS installs #385 (mcdonaldseanp)
- (MODULES-4986) Remove deprecated puppet 4 settings on upgrading to puppet 5+ #384 (caseywilliams)
- (MODULES-8598) Enable SLES upgrades outside of Puppet Enterprise #383 (caseywilliams)
- (FM-7732) Download puppet-agent packages over https #382 (donoghuc)
- (MODULES-5535) Update test matrix to work with MacOS/Solaris/Windows #381 (mcdonaldseanp)
- (MODULES-8320) Remove old platforms #380 (ekinanp)
- (PE-25542) add RHEL8 to puppet agent module #379 (alexandru-d-popa)
- (MODULES-4730) Do not pass the agent environment during MSI installs #378 (ScottGarman)
- (maint) Update minimum acceptance beaker-puppet version #377 (caseywilliams)
- (MODULES-8348) Refactor the acceptance test scaffold #376 (ekinanp)
- (MODULES-8406) fix the broken unless check for inherited permissions #375 (speedofdark)
- (MODULES-8523) Remove legacy Puppet 3 code #374 (ekinanp)
- (MODULES-8319) Update service to exclude MCO for puppet > 6 #373 (mcdonaldseanp)
- (MODULES-7840) Update docs with better parameter descriptions #372 (mcdonaldseanp)
- (MODULES-8348) Acceptance scaffold with beaker-puppet #371 (caseywilliams)
- (MODULES-8432) refresh PA repo if the version is not in the local cache #366 (mihaibuzgau)
- (PA-2282) Add developer documentation #357 (smcclellan)
- (PE-25223) Add OSX 10.14 to the puppet_agent_module #355 (sebastian-miclea)
- (PA-2282) Add Docker workflow for iterative development #352 (smcclellan)
2.0.1 - 2019-01-17
Other
- (packaging) Changelog/Metadata updates for 2.0.1 #370 (mcdonaldseanp)
2.0.0 - 2019-01-17
Added
- (MODULES-8446) Improve error messages for PE-only platforms #359 (caseywilliams)
Fixed
- (MODULES-8443) Don't restart mco for FOSS puppet6 upgrades #361 (caseywilliams)
Other
- (maint) make pid file name consistent on windows #369 (mcdonaldseanp)
- (maint) Fix some errors in windows upgrade script #368 (mcdonaldseanp)
- (MODULES-8398) Update windows upgrade script to recover services on fail #367 (mcdonaldseanp)
- (FM-7656) Use the HTTPS endpoint to fetch puppet-agent MSI files. #365 (speedofdark)
- (maint) Update task_acceptance tests to use updated dependencies #363 (donoghuc)
- (MODULES-8431) Update windows installation to use powershell #362 (mcdonaldseanp)
- (MODULES-8317) Update module dependencies #356 (caseywilliams)
- (MODULES-8393) Add task required metadata, hide extra implementations #353 (MikaelSmith)
- (PE-25228) Add Fedora 29 (x86_64) to the puppet_agent module #351 (gimmyxd)
- (MODULES-8318) Remove spec tests for puppet < 4 #350 (caseywilliams)
- (MODULES-8318) Update rspec-puppet, add yumrepo_core fixtures for puppet 6 #348 (caseywilliams)
- (feature) add scientific support to install task #347 (tphoney)
- Merge 1.x to master #346 (MikaelSmith)
- Add support for Oracle Linux Server #345 (aadamovich)
- (MODULES-8198) Use beaker ~> 3 #344 (caseywilliams)
- (maint) Use legacy dependencies repo for activemq #343 (geoffnichols)
- (maint) Use legacy dependencies repo for activemq #342 (geoffnichols)
- (PE-25425) Add SLES 15 support #340 (mcdonaldseanp)
- (MODULES-7760) Remove dist_tag in install.pp for RHEL platforms #335 (ekinanp)
- (MODULES-8086) Puppet 5 and 6: wrong urls for windows msi #334 (fculpo)
- (MODULES-7791) Remove deprecated source_permissions #332 (caseywilliams)
- (BOLT-915) Use facts module to query for target platform #331 (donoghuc)
- (BOLT-878) Fail fast when run as non-root #330 (adreyer)
- (maint) Explicitly upgrade when version is not specified for yum #328 (donoghuc)
- description of the task said puppet 5 #326 (yasminrajabi)
- (BOLT-834) Allow upgrade from puppet5 to puppet6 for install task #325 (donoghuc)
- (PE-24213) Add support for SLES 15 #324 (ScottGarman)
1.7.0 - 2018-09-18
Other
- (packaging) Prepare for 1.7.0 release #322 (branan)
- (MODULES-7758) Properly handle distro tag for Fedora platforms #321 (ekinanp)
- (MODULES-7698) Fix OSX agent upgrades #320 (ekinanp)
- (maint) Update to Bolt 0.21.8 #319 (donoghuc)
- (MOD-7655) SLES support for install_agent tasks #318 (donoghuc)
- (maint) Bump beaker-task_helper version #316 (donoghuc)
- (maint) Revert to beaker 3.x.x #315 (donoghuc)
- (maint) Require beaker-puppet for beaker 4.0 update #314 (donoghuc)
- (BOLT-742) Add support for collections to install task #312 (MikaelSmith)
- (BOLT-229) update to use new test helpers in BoltSpec and task_helpers #311 (adreyer)
- (maint) Restore correct dependencies with Beaker 4 #310 (MikaelSmith)
- (MODULES-7580) Fix PowerShell task for puppet version on 32bit #309 (glennsarti)
- (BOLT-703) Install puppet agent on windows #308 (donoghuc)
- (BOLT-702) Install puppet agent on osx #307 (donoghuc)
- (BOLT-641) Add version task #306 (MikaelSmith)
- (PDK-1036) Unpin rspec-puppet from 2.6.9 #305 (rodjek)
- Merge 1.6.2 release back to 1.x #304 (branan)
- (BOLT-701) Add task to install agent package on linux #302 (adreyer)
- (CPR-409) Ensure PL projects can handle fedora without the f prefix #232 (mwaggett)
1.6.2 - 2018-07-26
Other
- (MODULES-7535) Prep for 1.6.2 release #303 (branan)
- (MODULES-7480) Set default collection in params.pp using PE version #301 (ekinanp)
- (maint) Mergeback 1.x into master #300 (glennsarti)
- (MAINT) Mergeback Release of 1.6.1 #299 (michaeltlombardi)
1.6.1 - 2018-06-26
Other
- (MODULES-7167) Prepare module for 1.6.1 release #298 (glennsarti)
- (MODULES-5230) Use legacy fact variables #297 (glennsarti)
- (MODULES-4424) Add skip_if_unavailable to yumrepo resource #296 (speedofdark)
- (MODULES-7329) Fix update failure for FIPS #295 (smcclellan)
- (PE-23722) Update metadata to add Ubuntu 18.04 #294 (caseywilliams)
- [MODULES-4195] Install AIX 6.1 RPMs on all AIX versions for puppet6 #292 (caseywilliams)
- (MODULES-7167) Prepare for 1.6.1 release #290 (glennsarti)
- (MODULES-6915) Remove check for PE when calculating whether to upgrade #289 (smcclellan)
- (MODULES-4271) Update Windows OSes in metadata #288 (glennsarti)
- Merge 1.x into master #287 (branan)
- (MODULES-5230) Do not manage PA version on PE infra nodes #286 (npwalker)
- (MODULES-6708) fix tests for windows agent to agent upgrades #285 (speedofdark)
- (maint) Update Stdlib dependency #284 (glennsarti)
- (MODULES-6717) Mergeback 1.x to Master and remove Puppet 3.8 #283 (glennsarti)
1.6.0 - 2018-03-21
Other
- (MODULES-6832) Prepare for v1.6.0 release #282 (glennsarti)
- (MODULES-6717) Configure 1.x branch for last 3.8 compatible release #281 (glennsarti)
- (PA-1887) Fix osfamily::darwin OSX version regex #278 (ekinanp)
- (MODULES-6688) Use travis for CI testing, instead of Jenkins #276 (glennsarti)
- (MODULES-6686) Fix puppet_agent_spec tests for Windows #275 (glennsarti)
- (PE-23563) Stop MCO and Puppet prior to MSI install #274 (glennsarti)
- (PE-23558) Add RHEL 7 AARCH64 #273 (ekinanp)
- (PE-23542) Add OSX 10.13 #272 (ekinanp)
- (maint) modulesync cd884db Remove AppVeyor OpenSSL update on Ruby 2.4 #270 (michaeltlombardi)
- (maint) - modulesync 384f4c1 #269 (tphoney)
- ensure compatibility to puppetlabs/apt > 3.0.0 #268 (juckerf)
- Merge 1.5.0 release back into master #267 (branan)
1.5.0 - 2017-11-29
Other
- (maint) Fix release date for 1.5.0 release #266 (branan)
- (MODULES-6095) Review docs for release. #265 (gguillotte)
- (maint) Disable PuppetLint i18n check #264 (MikaelSmith)
- (maint) - modulesync 1d81b6a #263 (pmcmaw)
- (MODULES-6041) Prepare for 1.5.0 release #262 (branan)
- (MODULES-5979) Use rpm upgrade for puppet-agent upgrades #261 (MikaelSmith)
- (PE-22810) Removed _client_cert_verification #260 (barleyj-puppet)
- (MODULES-5953) Adds ability to set stringify_facts #259 (petems)
- (maint) Test on Trusty for Travis #257 (glennsarti)
- (maint) Add Travis badge to README #256 (petems)
- (MODULES-5944) Fixes failure for stringify_facts #255 (petems)
- (MODULES-5942) Always use upgrade script on Solaris 10 #254 (MikaelSmith)
- (MODULES-5622) Add REINSTALLMODE for win install #253 (jcoconnor)
- Make management of /etc/pki directory optional #252 (danpatdav)
- (PE-22505) Add ppc64le to the list of valid architecture regexes #251 (ekinanp)
- fix dist tag on Amazon Linux (avoids issue when ensuring package version) #249 (wyardley)
- (maint) modulesync 892c4cf #248 (HAIL9000)
- (MODULES-5633) Add support for Puppet 5 on Redhat osfamily #247 (branan)
- (maint) Add pid file to Solaris upgrade #246 (MikaelSmith)
- (maint) Fix Travis CI #244 (MikaelSmith)
- (maint) modulesync 915cde70e20 #243 (glennsarti)
- (MODULES-3787) Fix upgrades on Solaris 10 when initiated from service #242 (MikaelSmith)
1.4.1 - 2017-07-27
Other
- (maint) bump inifile dependency #240 (eputnam)
- (maint) Use http for RedHat repos #239 (MikaelSmith)
- (MODULES-5235) Prepare 1.4.1 release #238 (MikaelSmith)
- (maint) Include spec_helper so parallel specs succeed #237 (MikaelSmith)
- puppet_stringify_facts fixes for Puppet 4 #236 (lukebigum)
- (MODULES-4547) setting the package provider to sun for Solaris 10 hosts in case the … #220 (sirinek)
1.4.0 - 2017-06-14
Other
- (packaging) Prepare for 1.4.0 release #235 (branan)
- (PA-1160) Add support for AIX 7.2 #234 (branan)
- (maint) Pin fixtures to puppetlabs-apt 2.3.0 #227 (MikaelSmith)
- (MODULES-4732) Bump transition dependency to 0.1.1 #226 (natemccurdy)
- [msync] 786266 Implement puppet-module-gems, a45803 Remove metadata.json from locales config #223 (wilson208)
- (MODULES-4521) Update suse GPG file location #218 (johnduarte)
- (Issue #132) Change Notify resource to Exec #217 (jghward)
- (MODULES-4521) Use local copy of Puppet GPG keys #216 (MikaelSmith)
- (MODULES-4478) Fix
tr
invocation for some versions of RedHat #215 (MikaelSmith)
1.3.2 - 2017-02-07
Added
- (maint)(MODULES-3710) Apply module sync configs to puppet_agent module and fix strict variable tests #207 (glennsarti)
Other
- (MODULES-4241) Fix Windows acceptance #212 (MikaelSmith)
- (maint) remove Moses as a maintainer #210 (MosesMendoza)
- (MODULES-3994) Manage services on Puppet 4 #209 (MikaelSmith)
- (packaging) Prepare for 1.3.2 release #208 (MikaelSmith)
- (MODULES-4214) Add additional installation parameters during upgrade #204 (glennsarti)
- Ensure all variables are populated #203 (rnelson0)
- (maint) Only update server.cfg if not already managed #202 (MikaelSmith)
- (MODULES-4241) Enable Windows acceptance testing #201 (MikaelSmith)
- (MODULES-4241) Add custom fact puppet_agent_appdata #200 (MikaelSmith)
- Use getvar for facts that doesn't exist in my environment #199 (TomaszUrugOlszewski)
- (MODULES-4207) Optionally move puppetres.dll on Windows upgrade #198 (glennsarti)
- (FM-5839) Ensure server is set for all actions #194 (MikaelSmith)
- (MODULES-4236) Disable proxy for yum repo as it will not pass through to Puppet Server and will not hand over the certs. #153 (cyberious)
1.3.1 - 2016-11-17
Other
- (maint) Bump release data in CHANGELOG #191 (branan)
- (maint) Only use sha256lite when we are already on AIO #190 (branan)
- (FM-5815) Prep for 1.3.1 release #189 (branan)
- (maint) Fix config for Jenkins #188 (MikaelSmith)
- (MODULES-4092) Install solaris 10 package per-zone #187 (branan)
- (MODULES-4030) Always prepare package #185 (highb)
- (maint) Add internal_list key to MAINTAINERS #184 (theshanx)
- (maint) convert install_puppet.bat to CRLF #183 (ferventcoder)
1.3.0 - 2016-10-17
Other
- (FM-5320) Docs edits #181 (jtappa)
- (maint) Update supported platforms based on available packages #180 (MikaelSmith)
- (FM-5317) Prep for 1.3.0 release #179 (glennsarti)
- (Modules-3970) Update puppet windows agent download url schema #178 (spacepants)
- (MODULES-3962) Pin stdlib module to 4.12 #177 (Magisus)
- (maint) Add Moses and Glenn as maintainers #175 (MosesMendoza)
- (maint) Add MAINTAINERS file #174 (MosesMendoza)
- (MODULES-3872) add acceptance test for manage_repo param #173 (MosesMendoza)
- (MODULES-3912) Remove POWER8 hardware constraint from README #172 (geoffnichols)
- (MODULES-3953) avoid applying settings catalog in acceptance #171 (MosesMendoza)
- (MODULES-3951) Add explicit check for stringify_facts #170 (binford2k)
- (maint) add task for generating nodesets for testing #169 (MosesMendoza)
- (maint) Use the forge for test fixtures #167 (glennsarti)
- (doc) Update documentation for Windows #165 (glennsarti)
- (maint) correct spelling error in README.markdown #164 (MosesMendoza)
- (PE-17663) update logic for solaris 11 package name #163 (johnduarte)
- (FM-4989) Remove POWER version constraint for AIX #162 (geoffnichols)
- (MODULES-3896) Avoid unknown variables #160 (MikaelSmith)
- (docs) Note unchanged config options #159 (MikaelSmith)
- updated unless condition on Suse/Redhat GPG key imports to ensure downcasing #158 (exodusftw)
- (PE-17508) Fix puppet-agent suffix on fedora #154 (johnduarte)
- (MODULES-3872) Updated to provide the ability to disable configuration of PE/FOSS repositories #152 (exodusftw)
- (RE-7976) Update to use the new GPG key #151 (underscorgan)
- (maint) Fix linting #148 (MikaelSmith)
- Set perms for Windows package differently than for Linux #147 (esalberg)
- (maint) Fix CI, where host['ip'] is nil #144 (MikaelSmith)
- (maint) Fixes typo in Rakefile #143 (bmjen)
- (PE-17012) Do not manage puppet symlink #139 (highb)
- (maint) Add puppet-lint workarounds for CI, use valid certnames #138 (MikaelSmith)
- (MODULES-3657) Fix waiting on Windows during upgrade #137 (glennsarti)
- (MODULES-3434) Wait 120 seconds for Windows agent #136 (Iristyle)
- (MODULES-3636) Upgrade on non-English Windows #135 (Iristyle)
- Test if stringify_facts = true on agent #131 (hpcprofessional)
- (MODULES-3571) Allow setting install_path for MSI #130 (MikaelSmith)
- (maint) Fix up tests #129 (MikaelSmith)
- (PE-16317) Disable client SSL verification on Xenial #128 (highb)
- Explicitly setting environment to nodes current environment #127 (james-powis)
- (MODULES-3449) Stop Windows pxp-agent service #124 (Iristyle)
- (MODULES-3433) Write Windows PID file on upgrade #122 (Iristyle)
- (maint) Update metadata.json for Puppet 3.7 #119 (Iristyle)
1.2.0 - 2016-05-04
Other
- Update CHANGELOG.md #117 (highb)
- (MODULES-3304/PE-15256) Fix Windows 2008 upgrades #116 (highb)
- (maint) Add maintainers #115 (MikaelSmith)
- (PE-11531) Fix upgrade issue with dev builds #113 (highb)
- (PE-15036) Fix Windows permission inheritance #112 (highb)
- (RE-7037) Use updated gpg key #111 (underscorgan)
- (PE-11531) Stop OSX from forgetting packages #110 (highb)
- (PE-11531) Centralize check for aio upgrade #108 (highb)
- (maint) Fix handling dev versions on Solaris 11 #107 (MikaelSmith)
- (PE-11531) Don't remove packages if package_version undef #106 (highb)
- (maint) Update metadata to remove pe requirement. #104 (bmjen)
- (maint) Fix spec that should've skipped Solaris #103 (MikaelSmith)
- (packaging) Prepare for puppetlabs-puppet_agent 1.2.0 #102 (MikaelSmith)
- (PE-14495) Remove pluginsync setting if upgrading to 1.4.x #101 (MikaelSmith)
- (maint) Fix issue #98, don't require
pe_compiling_server_aio_build
#100 (MikaelSmith) - (maint) Fix a dependency cycle introduced on Windows by Sol11 work #99 (MikaelSmith)
- (maint) Re-enable open-source upgrades from 3.x #96 (MikaelSmith)
- (PE-11531) Fix Debian ensure => version #95 (highb)
- (PE-14463) Support 32-bit Windows via pe_repo #94 (MikaelSmith)
- (PE-12299) Add Solaris 11 support #93 (MikaelSmith)
- (maint) Update supported platforms #92 (MikaelSmith)
- (maint) Fix acceptance using Vagrant configs, allow flexible starting Puppet version #91 (MikaelSmith)
- (maint) Fix typo breaking Debian upgrade for PE #89 (purplexa)
- (PE-11531) Allow upgrades from Puppet 4+ #86 (highb)
- add support for Amazon Linux to puppet_agent::osfamily::redhat #85 (oshaughnessy)
- (PE-13179) remove lower version requirement in code #81 (mwbutcher)
1.1.0 - 2016-03-01
Other
- README update #88 (bmjen)
- Release Prep for 1.1.0 #87 (HelenCampbell)
- (PE-10956) Ensure local package resource defined on Windows #84 (highb)
- (PE-10956) Manage /opt/puppetlabs #83 (jpartlow)
- (PE-10956) Manage /opt/puppetlabs #82 (highb)
- Use slashes for regex #80 (glarizza)
- (MODULES-3015) Fix SLES11 GPG key import issue #79 (glarizza)
- (PE-13608) Do not convert windows file resource to RAL catalog #76 (demophoon)
- (PE-12002) Add AIX support #74 (mwbutcher)
- (PE-12001) Add Solaris 10 sparc to supported arch #72 (highb)
- (PE-13179) Puppet Agent Module: Update metadata.json to include Anken… #71 (mwbutcher)
- Issue/master/pe 10914 add osx 109 upgrade #70 (mwbutcher)
- (maint) allow using the internal mirror when resolving gems #69 (justinstoller)
- (MODULES-2750) Pass in Puppet agent PID as command line parameter to avoid recreatin… #68 (dhs-rec)
- (PE-10956) windows upgrade #66 (highb)
- (PE-12001) Add solaris 10 #65 (jpartlow)
- (PE-10915) Add SLES 10 upgrade for PE #63 (jpartlow)
1.0.0 - 2015-07-30
Other
- (maint) Add changelog for 1.0.0 release #61 (MikaelSmith)
- (PUP-4925) Label a known issue with Server 2003 #60 (MikaelSmith)
- (PUP-4921) Add PE version restriction #59 (MikaelSmith)
- (maint) Clarify upgrade process in docs #58 (MikaelSmith)
- (doc) Fix minor typo and note changing client.cfg #57 (MikaelSmith)
- Remove classfile puppet.conf setting, update for PE windows #56 (ericwilliamson)
0.2.0 - 2015-07-22
Other
- (maint) Provide changelog for 0.2.0 release #55 (MikaelSmith)
- (maint) Add Windows support to metadata #54 (MikaelSmith)
- Metadata updates #53 (underscorgan)
- FM-2915: added known issue for Windows #52 (jbondpdx)
- (PUP-4886) Clear settings at global level #51 (MikaelSmith)
- (PUP-4808) Remove Ubuntu 14.10 support #50 (MikaelSmith)
- (maint) Fix issue where we are breaking uri path for windows #49 (cyberious)
- (PUP-4849) Make puppet_agent ensure platform type in tests #48 (MikaelSmith)
- (maint) Fixes for Forge score #47 (MikaelSmith)
- (PE-10132) Remove old PE 3.8 repo #46 (ericwilliamson)
- (maint) Use BKR-314 and BKR-317 fixes #32 (MikaelSmith)
0.1.0 - 2015-07-09
Dependencies
- puppetlabs-stdlib (>= 9.0.0 < 10.0.0)
- puppetlabs-inifile (>= 6.1.0 < 7.0.0)
- puppetlabs-apt (>= 9.2.0 < 10.0.0)
- puppetlabs-facts (>= 0.5.0 < 2.0.0)
Apache License Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 1. Definitions. "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. "Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License. "Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity. For the purposes of this definition, "control" means (i) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity. "You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License. "Source" form shall mean the preferred form for making modifications, including but not limited to software source code, documentation source, and configuration files. "Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types. "Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below). "Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship. For the purposes of this License, Derivative Works shall not include works that remain separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof. "Contribution" shall mean any work of authorship, including the original version of the Work and any modifications or additions to that Work or Derivative Works thereof, that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner. For the purposes of this definition, "submitted" means any form of electronic, verbal, or written communication sent to the Licensor or its representatives, including but not limited to communication on electronic mailing lists, source code control systems, and issue tracking systems that are managed by, or on behalf of, the Licensor for the purpose of discussing and improving the Work, but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contribution." "Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work. 2. Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such Derivative Works in Source or Object form. 3. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer the Work, where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s) with the Work to which such Contribution(s) was submitted. If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed. 4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions: (a) You must give any other recipients of the Work or Derivative Works a copy of this License; and (b) You must cause any modified files to carry prominent notices stating that You changed the files; and (c) You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark, and attribution notices from the Source form of the Work, excluding those notices that do not pertain to any part of the Derivative Works; and (d) If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that You distribute must include a readable copy of the attribution notices contained within such NOTICE file, excluding those notices that do not pertain to any part of the Derivative Works, in at least one of the following places: within a NOTICE text file distributed as part of the Derivative Works; within the Source form or documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License. You may add Your own attribution notices within Derivative Works that You distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be construed as modifying the License. You may add Your own copyright statement to Your modifications and may provide additional or different license terms and conditions for use, reproduction, or distribution of Your modifications, or for any such Derivative Works as a whole, provided Your use, reproduction, and distribution of the Work otherwise complies with the conditions stated in this License. 5. Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally submitted for inclusion in the Work by You to the Licensor shall be under the terms and conditions of this License, without any additional terms or conditions. Notwithstanding the above, nothing herein shall supersede or modify the terms of any separate license agreement you may have executed with Licensor regarding such Contributions. 6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file. 7. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work (and each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License. 8. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall any Contributor be liable to You for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising as a result of this License or out of the use or inability to use the Work (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if such Contributor has been advised of the possibility of such damages. 9. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may choose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations and/or rights consistent with this License. However, in accepting such obligations, You may act only on Your own behalf and on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify, defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of your accepting any such warranty or additional liability. END OF TERMS AND CONDITIONS APPENDIX: How to apply the Apache License to your work. To apply the Apache License to your work, attach the following boilerplate notice, with the fields enclosed by brackets "[]" replaced with your own identifying information. (Don't include the brackets!) The text should be enclosed in the appropriate comment syntax for the file format. We also recommend that a file or class name and description of purpose be included on the same "printed page" as the copyright notice for easier identification within third-party archives. Copyright [yyyy] [name of copyright owner] Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
Quality checks
We run a couple of automated scans to help you assess a module’s quality. Each module is given a score based on how well the author has formatted their code and documentation and select modules are also checked for malware using VirusTotal.
Please note, the information below is for guidance only and neither of these methods should be considered an endorsement by Puppet.
Malware scan results
The malware detection service on Puppet Forge is an automated process that identifies known malware in module releases before they’re published. It is not intended to replace your own virus scanning solution.
Learn more about malware scans- Module name:
- puppetlabs-puppet_agent
- Module version:
- 4.21.0
- Scan initiated:
- September 24th 2024, 17:51:13
- Detections:
- 0 / 63
- Scan stats:
- 63 undetected
- 0 harmless
- 0 failures
- 0 timeouts
- 0 malicious
- 0 suspicious
- 14 unsupported
- Scan report:
- View the detailed scan report