Skip to content

Commit bd4b383

Browse files
committed
Edits from docs team
1 parent 00c4eac commit bd4b383

File tree

11 files changed

+85
-74
lines changed

11 files changed

+85
-74
lines changed

lib/puppet/defaults.rb

Lines changed: 60 additions & 53 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ def self.default_diffargs
77
'-u'
88
end
99

10+
# If you modify this, update puppet/type/file/checksum.rb too
1011
def self.default_digest_algorithm
1112
'sha256'
1213
end
@@ -161,9 +162,8 @@ def self.initialize_default_settings!(settings)
161162
:skip_logging_catalog_request_destination => {
162163
:default => false,
163164
:type => :boolean,
164-
:desc => "Disables \"notice\" level messages specifying which server the
165-
agent requests a catalog from and which server actually handles
166-
the request.",
165+
:desc => "Specifies whether to suppress the notice of which compiler
166+
supplied the catalog. A value of `true` suppresses the notice.",
167167
},
168168
:merge_dependency_warnings => {
169169
:default => false,
@@ -418,13 +418,15 @@ def self.initialize_default_settings!(settings)
418418
:type => :boolean,
419419
:default => true,
420420
:desc => <<-'EOT'
421-
When versioned_environment_dirs is `true` Puppet will readlink the environmentpath
422-
when constructing the environment's modulepath. The full readlinked path is referred
423-
to as the "resolved path" and the configured path potentially containing symlinks is
424-
the "configured path". When reporting where resources come from users may choose
425-
between the configured or resolved path.
426-
427-
When set to false, the resolved paths are reported instead of the configured paths.
421+
Specifies how environment paths are reported. When the value of
422+
`versioned_environment_dirs` is `true`, Puppet applies the readlink function to
423+
the `environmentpath` setting when constructing the environment's modulepath. The
424+
full readlinked path is referred to as the "resolved path," and the configured
425+
path potentially containing symlinks is the "configured path." When reporting
426+
where resources come from, users may choose between the configured and resolved
427+
path.
428+
429+
When set to `false`, the resolved paths are reported instead of the configured paths.
428430
EOT
429431
},
430432
:use_last_environment => {
@@ -1205,33 +1207,34 @@ def self.initialize_default_settings!(settings)
12051207
:ca_refresh_interval => {
12061208
:default => "1d",
12071209
:type => :duration,
1208-
:desc => "How often the Puppet agent refreshes its local CA certs. By
1209-
default the CA certs are refreshed once every 24 hours. If a different
1210-
duration is specified, then the agent will refresh its CA certs whenever
1211-
it next runs and the elapsed time since the certs were last refreshed
1212-
exceeds the duration.
1213-
1214-
In general, the duration should be greater than the `runinterval`.
1215-
Setting it to 0 or an equal or lesser value than `runinterval`,
1216-
will cause the CA certs to be refreshed on every run.
1217-
1218-
If the agent downloads new CA certs, the agent will use it for subsequent
1210+
:desc => "How often the Puppet agent refreshes its local CA
1211+
certificates. By default, CA certificates are refreshed every 24 hours. If a
1212+
different interval is specified, the agent refreshes its CA certificates during
1213+
the next agent run if the elapsed time since the certificates were last
1214+
refreshed exceeds the specified duration.
1215+
1216+
In general, the interval should be greater than the `runinterval`
1217+
value. Setting the `ca_refresh_interval` value to 0 or an equal or
1218+
lesser value than `runinterval` causes the CA certificates to be
1219+
refreshed on every run.
1220+
1221+
If the agent downloads new CA certs, the agent uses those for subsequent
12191222
network requests. If the refresh request fails or if the CA certs are
12201223
unchanged on the server, then the agent run will continue using the
12211224
local CA certs it already has. #{AS_DURATION}",
12221225
},
12231226
:crl_refresh_interval => {
12241227
:default => "1d",
12251228
:type => :duration,
1226-
:desc => "How often the Puppet agent refreshes its local CRL. By
1227-
default the CRL is refreshed once every 24 hours. If a different
1228-
duration is specified, then the agent will refresh its CRL whenever
1229-
it next runs and the elapsed time since the CRL was last refreshed
1230-
exceeds the duration.
1229+
:desc => "How often the Puppet agent refreshes its local Certificate
1230+
Revocation List (CRL). By default, the CRL is refreshed every 24 hours. If
1231+
a different interval is specified, the agent refreshes its CRL on the next
1232+
Puppet agent run if the elapsed time since the CRL was last refreshed
1233+
exceeds the specified interval.
12311234
1232-
In general, the duration should be greater than the `runinterval`.
1233-
Setting it to 0 or an equal or lesser value than `runinterval`,
1234-
will cause the CRL to be refreshed on every run.
1235+
In general, the interval should be greater than the `runinterval` value.
1236+
Setting the `crl_refresh_interval` value to 0 or an equal or lesser value
1237+
than `runinterval` causes the CRL to be refreshed on every run.
12351238
12361239
If the agent downloads a new CRL, the agent will use it for subsequent
12371240
network requests. If the refresh request fails or if the CRL is
@@ -1241,18 +1244,19 @@ def self.initialize_default_settings!(settings)
12411244
:hostcert_renewal_interval => {
12421245
:default => "30d",
12431246
:type => :duration,
1244-
:desc => "When the Puppet agent refreshes its client certificate.
1245-
By default the client certificate will refresh 30 days before the certificate
1246-
expires. If a different duration is specified, then the agent will refresh its
1247-
client certificate whenever it next runs and if the client certificate expires
1248-
within the duration specified.
1247+
:desc => "How often the Puppet agent renews its client certificate. By
1248+
default, the client certificate is renewed 30 days before the certificate
1249+
expires. If a different interval is specified, the agent renews its client
1250+
certificate during the next agent run, assuming that the client certificate has
1251+
expired within the specified duration.
12491252
1250-
In general, the duration should be greater than the `runinterval`.
1251-
Setting it to 0 will disable automatic renewal.
1253+
In general, the `hostcert_renewal_interval` value should be greater than the
1254+
`runinterval` value. Setting the `hostcert_renewal_interval` value to 0 disables
1255+
automatic renewal.
12521256
1253-
If the agent downloads a new certificate, the agent will use it for subsequent
1254-
network requests. If the refresh request fails, then the agent run will continue using the
1255-
certificate it already has. #{AS_DURATION}",
1257+
If the agent downloads a new certificate, the agent will use it
1258+
for subsequent network requests. If the refresh request fails, the agent run
1259+
continues to use its existing certificate. #{AS_DURATION}",
12561260
},
12571261
:keylength => {
12581262
:default => 4096,
@@ -1493,8 +1497,10 @@ def self.initialize_default_settings!(settings)
14931497
:exclude_unchanged_resources => {
14941498
:default => true,
14951499
:type => :boolean,
1496-
:desc => 'When set to true, resources that have had no changes after catalog application
1497-
will not have corresponding unchanged resource status updates listed in the report.'
1500+
:desc => "Specifies how unchanged resources are listed in reports. When
1501+
set to `true`, resources that have had no changes after catalog application
1502+
will not have corresponding unchanged resource status updates listed in a
1503+
report."
14981504
},
14991505
:reportdir => {
15001506
:default => "$vardir/reports",
@@ -1746,11 +1752,12 @@ def self.initialize_default_settings!(settings)
17461752
:allow_pson_serialization => {
17471753
:default => false,
17481754
:type => :boolean,
1749-
:desc => "Whether when unable to serialize to JSON or other formats,
1750-
Puppet falls back to PSON. This option affects both puppetserver's
1751-
configuration management service responses and when the agent saves its
1752-
cached catalog. This option is useful in preventing the loss of data because
1753-
rich data cannot be serialized via PSON.",
1755+
:desc => "Whether to allow PSON serialization. When unable to serialize to
1756+
JSON or other formats, Puppet falls back to PSON. This option affects the
1757+
configuration management service responses of Puppet Server and the process by
1758+
which the agent saves its cached catalog. With a default value of `false`, this
1759+
option is useful in preventing the loss of data because rich data cannot be
1760+
serialized via PSON.",
17541761
},
17551762
:agent_catalog_run_lockfile => {
17561763
:default => "$statedir/agent_catalog_run.lock",
@@ -1776,7 +1783,7 @@ def self.initialize_default_settings!(settings)
17761783
:type => :boolean,
17771784
:default => false,
17781785
:desc => "Whether to include legacy facts when requesting a catalog. This
1779-
option can be set to false provided all puppet manifests, hiera.yaml and hiera
1786+
option can be set to `false` if all puppet manifests, hiera.yaml, and hiera
17801787
configuration layers no longer access legacy facts, such as `$osfamily`, and
17811788
instead access structured facts, such as `$facts['os']['family']`."
17821789
},
@@ -2092,12 +2099,12 @@ def self.initialize_default_settings!(settings)
20922099
:preprocess_deferred => {
20932100
:default => false,
20942101
:type => :boolean,
2095-
:desc => "Whether puppet should call deferred functions before applying
2096-
the catalog. If set to `true`, then all prerequisites needed for the
2097-
deferred function must be satisfied prior to puppet running. If set to
2098-
`false`, then deferred functions will follow puppet relationships and
2099-
ordering. This allows puppet to install prerequisites needed for a
2100-
deferred function and call the deferred function in the same run."
2102+
:desc => "Whether Puppet should call deferred functions before applying
2103+
the catalog. If set to `true`, all prerequisites required for the
2104+
deferred function must be satisfied before the Puppet run. If set to
2105+
`false`, deferred functions follow Puppet relationships and
2106+
ordering. In this way, Puppet can install the prerequisites required for a
2107+
deferred function and call the deferred function in the same run.",
21012108
},
21022109
:summarize => {
21032110
:default => false,

lib/puppet/functions/capitalize.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
# This function is compatible with the stdlib function with the same name.
66
#
77
# The function does the following:
8-
# * For a `String`, a string with its first character in upper case version is returned.
8+
# * For a `String`, a string is returned in which the first character is uppercase.
99
# This is done using Ruby system locale which handles some, but not all
1010
# special international up-casing rules (for example German double-s ß is capitalized to "Ss").
1111
# * For an `Iterable[Variant[String, Numeric]]` (for example an `Array`) each value is capitalized and the conversion is not recursive.

lib/puppet/functions/index.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,8 +40,8 @@
4040
# Note that the lambda gets the value and not an array with `[key, value]` as in other
4141
# iterative functions.
4242
#
43-
# Using a lambda that accepts two values works the same way, it simply gets the index/key
44-
# as the first parameter, and the value as the second.
43+
# Using a lambda that accepts two values works the same way. The lambda gets the index/key
44+
# as the first parameter and the value as the second parameter.
4545
#
4646
# @example Using the `index` function with an Array and a two-parameter lambda
4747
#

lib/puppet/functions/regsubst.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@
2020
# - *M* Multiline regexps
2121
# - *G* Global replacement; all occurrences of the regexp in each target string will be replaced. Without this, only the first occurrence will be replaced.
2222
# @param encoding [Enum['N','E','S','U']]
23-
# Deprecated and ignored parameter, only here for compatibility.
23+
# Deprecated and ignored parameter, included only for compatibility.
2424
# @return [Array[String], String] The result of the substitution. Result type is the same as for the target parameter.
2525
# @deprecated
2626
# This method has the optional encoding parameter, which is ignored.

lib/puppet/functions/unique.rb

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -65,8 +65,9 @@
6565
# *first-found* unique value, but for `Hash` it contains associations from a set of keys to the set of values clustered by the
6666
# equality lambda (or the default value equality if no lambda was given). This makes the `unique` function more versatile for hashes
6767
# in general, while requiring that the simple computation of "hash's unique set of values" is performed as `$hsh.map |$k, $v| { $v }.unique`.
68-
# (A unique set of hash keys is in general meaningless (since they are unique by definition) - although if processed with a different
69-
# lambda for equality that would be different. First map the hash to an array of its keys if such a unique computation is wanted).
68+
# (Generally, it's meaningless to compute the unique set of hash keys because they are unique by definition. However, the
69+
# situation can change if the hash keys are processed with a different lambda for equality. For this unique computation,
70+
# first map the hash to an array of its keys.)
7071
# If the more advanced clustering is wanted for one of the other data types, simply transform it into a `Hash` as shown in the
7172
# following example.
7273
#

lib/puppet/type/exec.rb

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -437,13 +437,12 @@ def check(value)
437437
actually contain `myfile`, the exec will keep running every time
438438
Puppet runs.
439439
440-
This parameter can also take an array of files and the command will
441-
not run if **any** of these files exist. For example:
440+
This parameter can also take an array of files, and the command will
441+
not run if **any** of these files exist. Consider this example:
442442
443443
creates => ['/tmp/file1', '/tmp/file2'],
444444
445-
will only run the command if both files don't exist.
446-
445+
The command is only run if both files don't exist.
447446
EOT
448447

449448
accept_arrays

lib/puppet/type/file/checksum.rb

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,11 +7,13 @@
77
Puppet::Type.type(:file).newparam(:checksum) do
88
include Puppet::Util::Checksums
99

10+
# The default is defined in Puppet.default_digest_algorithm
1011
desc "The checksum type to use when determining whether to replace a file's contents.
1112
12-
The default checksum type is #{Puppet.default_digest_algorithm}."
13+
The default checksum type is sha256."
1314

14-
newvalues(*Puppet::Util::Checksums.known_checksum_types)
15+
# The values are defined in Puppet::Util::Checksums.known_checksum_types
16+
newvalues(:sha256, :sha256lite, :md5, :md5lite, :sha1, :sha1lite, :sha512, :sha384, :sha224, :mtime, :ctime, :none)
1517

1618
defaultto do
1719
Puppet[:digest_algorithm].to_sym

lib/puppet/type/file/selcontext.rb

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ def sync
8686
end
8787

8888
Puppet::Type.type(:file).newparam(:selinux_ignore_defaults) do
89-
desc "If this is set then Puppet will not ask SELinux (via selabel_lookup) to
89+
desc "If this is set, Puppet will not call the SELinux function selabel_lookup to
9090
supply defaults for the SELinux attributes (seluser, selrole,
9191
seltype, and selrange). In general, you should leave this set at its
9292
default and only set it to true when you need Puppet to not try to fix
@@ -99,7 +99,7 @@ def sync
9999
Puppet::Type.type(:file).newproperty(:seluser, :parent => Puppet::SELFileContext) do
100100
desc "What the SELinux user component of the context of the file should be.
101101
Any valid SELinux user component is accepted. For example `user_u`.
102-
If not specified it defaults to the value returned by selabel_lookup for
102+
If not specified, it defaults to the value returned by selabel_lookup for
103103
the file, if any exists. Only valid on systems with SELinux support
104104
enabled."
105105

@@ -110,7 +110,7 @@ def sync
110110
Puppet::Type.type(:file).newproperty(:selrole, :parent => Puppet::SELFileContext) do
111111
desc "What the SELinux role component of the context of the file should be.
112112
Any valid SELinux role component is accepted. For example `role_r`.
113-
If not specified it defaults to the value returned by selabel_lookup for
113+
If not specified, it defaults to the value returned by selabel_lookup for
114114
the file, if any exists. Only valid on systems with SELinux support
115115
enabled."
116116

@@ -121,7 +121,7 @@ def sync
121121
Puppet::Type.type(:file).newproperty(:seltype, :parent => Puppet::SELFileContext) do
122122
desc "What the SELinux type component of the context of the file should be.
123123
Any valid SELinux type component is accepted. For example `tmp_t`.
124-
If not specified it defaults to the value returned by selabel_lookup for
124+
If not specified, it defaults to the value returned by selabel_lookup for
125125
the file, if any exists. Only valid on systems with SELinux support
126126
enabled."
127127

@@ -132,7 +132,7 @@ def sync
132132
Puppet::Type.type(:file).newproperty(:selrange, :parent => Puppet::SELFileContext) do
133133
desc "What the SELinux range component of the context of the file should be.
134134
Any valid SELinux range component is accepted. For example `s0` or
135-
`SystemHigh`. If not specified it defaults to the value returned by
135+
`SystemHigh`. If not specified, it defaults to the value returned by
136136
selabel_lookup for the file, if any exists. Only valid on systems with
137137
SELinux support enabled and that have support for MCS (Multi-Category
138138
Security)."

lib/puppet/type/package.rb

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -301,12 +301,13 @@ def self.parameters_to_include
301301
command => '/opt/ruby/bin/gem',
302302
}
303303
304-
Each provider defines a package management command; and uses the first
304+
Each provider defines a package management command and uses the first
305305
instance of the command found in the PATH.
306306
307307
Providers supporting the targetable feature allow you to specify the
308-
absolute path of the package management command; useful when multiple
309-
instances of the command are installed, or the command is not in the PATH.
308+
absolute path of the package management command. Specifying the absolute
309+
path is useful when multiple instances of the command are installed, or
310+
the command is not in the PATH.
310311
EOT
311312

312313
isnamevar

lib/puppet/type/user.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -231,7 +231,7 @@ def change_to_s(currentvalue, newvalue)
231231
* OS X 10.8 and higher use salted SHA512 PBKDF2 hashes. When managing passwords
232232
on these systems, the `salt` and `iterations` attributes need to be specified as
233233
well as the password.
234-
* macOS 10.15 and higher require the salt to be 32-bytes. Since Puppet's user
234+
* macOS 10.15 and later require the salt to be 32 bytes. Because Puppet's user
235235
resource requires the value to be hex encoded, the length of the salt's
236236
string must be 64.
237237
* Windows passwords can be managed only in cleartext, because there is no Windows

0 commit comments

Comments
 (0)