chef 14.14.25-universal-mingw32 → 14.14.29-universal-mingw32
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/lib/chef/knife/config_get.rb +2 -1
- data/lib/chef/provider/service/systemd.rb +16 -0
- data/lib/chef/provider/systemd_unit.rb +26 -2
- data/lib/chef/resource/service.rb +9 -0
- data/lib/chef/resource/systemd_unit.rb +1 -0
- data/lib/chef/version.rb +1 -1
- data/spec/integration/knife/config_get_spec.rb +7 -0
- data/spec/unit/provider/service/systemd_service_spec.rb +26 -2
- data/spec/unit/provider/systemd_unit_spec.rb +55 -6
- metadata +4 -4
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: bd40eeb7dfb7ae7084b93a40561e37f0c6e5bef18012dc55f35c00c2ea331639
|
4
|
+
data.tar.gz: fccae76a20ea0ee2d61b783c910d400d4eea9f547f6b57704c6d75a3ade58dc4
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 4f5c2dd2f7b8fbe1847fdedc866a5080c3c0844cdc50f1bbf22020c13b6dd1ea67086dce5bc4132eeed38278e63d78e9a04e12c5e9310e1cf8c51bc016e5ae14
|
7
|
+
data.tar.gz: 97bfcca00a020126d16e2d1b3ce27b9f3122b17126bfc1643526502ff7fc78fca94cfa2467ed1cba5b70bcb33b0650f6cf9602c81415f839abfc579663222d69
|
@@ -47,9 +47,10 @@ class Chef
|
|
47
47
|
if wcl.config_location
|
48
48
|
loading_from("configuration", wcl.config_location)
|
49
49
|
end
|
50
|
+
|
50
51
|
if Chef::Config[:config_d_dir]
|
51
52
|
wcl.find_dot_d(Chef::Config[:config_d_dir]).each do |path|
|
52
|
-
loading_from(".d/ configuration",
|
53
|
+
loading_from(".d/ configuration", path)
|
53
54
|
end
|
54
55
|
end
|
55
56
|
end
|
@@ -51,6 +51,7 @@ class Chef::Provider::Service::Systemd < Chef::Provider::Service::Simple
|
|
51
51
|
current_resource.running(false)
|
52
52
|
current_resource.enabled(false)
|
53
53
|
current_resource.masked(false)
|
54
|
+
current_resource.indirect(false)
|
54
55
|
end
|
55
56
|
else
|
56
57
|
current_resource.running(is_active?)
|
@@ -58,6 +59,7 @@ class Chef::Provider::Service::Systemd < Chef::Provider::Service::Simple
|
|
58
59
|
|
59
60
|
current_resource.enabled(is_enabled?)
|
60
61
|
current_resource.masked(is_masked?)
|
62
|
+
current_resource.indirect(is_indirect?)
|
61
63
|
current_resource
|
62
64
|
end
|
63
65
|
|
@@ -142,11 +144,19 @@ class Chef::Provider::Service::Systemd < Chef::Provider::Service::Simple
|
|
142
144
|
end
|
143
145
|
|
144
146
|
def enable_service
|
147
|
+
if current_resource.masked || current_resource.indirect
|
148
|
+
logger.trace("#{new_resource} cannot be enabled: it is masked or indirect")
|
149
|
+
return
|
150
|
+
end
|
145
151
|
options, args = get_systemctl_options_args
|
146
152
|
shell_out!("#{systemctl_path} #{args} enable #{Shellwords.escape(new_resource.service_name)}", **options)
|
147
153
|
end
|
148
154
|
|
149
155
|
def disable_service
|
156
|
+
if current_resource.masked || current_resource.indirect
|
157
|
+
logger.trace("#{new_resource} cannot be disabled: it is masked or indirect")
|
158
|
+
return
|
159
|
+
end
|
150
160
|
options, args = get_systemctl_options_args
|
151
161
|
shell_out!("#{systemctl_path} #{args} disable #{Shellwords.escape(new_resource.service_name)}", **options)
|
152
162
|
end
|
@@ -171,6 +181,12 @@ class Chef::Provider::Service::Systemd < Chef::Provider::Service::Simple
|
|
171
181
|
shell_out("#{systemctl_path} #{args} is-enabled #{Shellwords.escape(new_resource.service_name)} --quiet", **options).exitstatus == 0
|
172
182
|
end
|
173
183
|
|
184
|
+
def is_indirect?
|
185
|
+
options, args = get_systemctl_options_args
|
186
|
+
s = shell_out("#{systemctl_path} #{args} is-enabled #{Shellwords.escape(new_resource.service_name)}", **options)
|
187
|
+
s.stdout.include?("indirect")
|
188
|
+
end
|
189
|
+
|
174
190
|
def is_masked?
|
175
191
|
options, args = get_systemctl_options_args
|
176
192
|
s = shell_out("#{systemctl_path} #{args} is-enabled #{Shellwords.escape(new_resource.service_name)}", **options)
|
@@ -42,6 +42,7 @@ class Chef
|
|
42
42
|
current_resource.active(active?)
|
43
43
|
current_resource.masked(masked?)
|
44
44
|
current_resource.static(static?)
|
45
|
+
current_resource.indirect(indirect?)
|
45
46
|
current_resource.triggers_reload(new_resource.triggers_reload)
|
46
47
|
|
47
48
|
current_resource
|
@@ -90,10 +91,14 @@ class Chef
|
|
90
91
|
if current_resource.static
|
91
92
|
logger.trace("#{new_resource.unit_name} is a static unit, enabling is a NOP.")
|
92
93
|
end
|
94
|
+
if current_resource.indirect
|
95
|
+
logger.trace("#{new_resource.unit_name} is an indirect unit, enabling is a NOP.")
|
96
|
+
end
|
93
97
|
|
94
|
-
unless current_resource.enabled || current_resource.static
|
98
|
+
unless current_resource.enabled || current_resource.static || current_resource.indirect
|
95
99
|
converge_by("enabling unit: #{new_resource.unit_name}") do
|
96
100
|
systemctl_execute!(:enable, new_resource.unit_name)
|
101
|
+
logger.info("#{new_resource} enabled")
|
97
102
|
end
|
98
103
|
end
|
99
104
|
end
|
@@ -103,9 +108,14 @@ class Chef
|
|
103
108
|
logger.trace("#{new_resource.unit_name} is a static unit, disabling is a NOP.")
|
104
109
|
end
|
105
110
|
|
106
|
-
if current_resource.
|
111
|
+
if current_resource.indirect
|
112
|
+
logger.trace("#{new_resource.unit_name} is an indirect unit, enabling is a NOP.")
|
113
|
+
end
|
114
|
+
|
115
|
+
if current_resource.enabled && !current_resource.static && !current_resource.indirect
|
107
116
|
converge_by("disabling unit: #{new_resource.unit_name}") do
|
108
117
|
systemctl_execute!(:disable, new_resource.unit_name)
|
118
|
+
logger.info("#{new_resource} disabled")
|
109
119
|
end
|
110
120
|
end
|
111
121
|
end
|
@@ -113,6 +123,7 @@ class Chef
|
|
113
123
|
def action_reenable
|
114
124
|
converge_by("reenabling unit: #{new_resource.unit_name}") do
|
115
125
|
systemctl_execute!(:reenable, new_resource.unit_name)
|
126
|
+
logger.info("#{new_resource} reenabled")
|
116
127
|
end
|
117
128
|
end
|
118
129
|
|
@@ -120,6 +131,7 @@ class Chef
|
|
120
131
|
unless current_resource.masked
|
121
132
|
converge_by("masking unit: #{new_resource.unit_name}") do
|
122
133
|
systemctl_execute!(:mask, new_resource.unit_name)
|
134
|
+
logger.info("#{new_resource} masked")
|
123
135
|
end
|
124
136
|
end
|
125
137
|
end
|
@@ -128,6 +140,7 @@ class Chef
|
|
128
140
|
if current_resource.masked
|
129
141
|
converge_by("unmasking unit: #{new_resource.unit_name}") do
|
130
142
|
systemctl_execute!(:unmask, new_resource.unit_name)
|
143
|
+
logger.info("#{new_resource} unmasked")
|
131
144
|
end
|
132
145
|
end
|
133
146
|
end
|
@@ -136,6 +149,7 @@ class Chef
|
|
136
149
|
unless current_resource.active
|
137
150
|
converge_by("starting unit: #{new_resource.unit_name}") do
|
138
151
|
systemctl_execute!(:start, new_resource.unit_name, default_env: false)
|
152
|
+
logger.info("#{new_resource} started")
|
139
153
|
end
|
140
154
|
end
|
141
155
|
end
|
@@ -144,6 +158,7 @@ class Chef
|
|
144
158
|
if current_resource.active
|
145
159
|
converge_by("stopping unit: #{new_resource.unit_name}") do
|
146
160
|
systemctl_execute!(:stop, new_resource.unit_name, default_env: false)
|
161
|
+
logger.info("#{new_resource} stopped")
|
147
162
|
end
|
148
163
|
end
|
149
164
|
end
|
@@ -151,6 +166,7 @@ class Chef
|
|
151
166
|
def action_restart
|
152
167
|
converge_by("restarting unit: #{new_resource.unit_name}") do
|
153
168
|
systemctl_execute!(:restart, new_resource.unit_name, default_env: false)
|
169
|
+
logger.info("#{new_resource} restarted")
|
154
170
|
end
|
155
171
|
end
|
156
172
|
|
@@ -158,6 +174,7 @@ class Chef
|
|
158
174
|
if current_resource.active
|
159
175
|
converge_by("reloading unit: #{new_resource.unit_name}") do
|
160
176
|
systemctl_execute!(:reload, new_resource.unit_name, default_env: false)
|
177
|
+
logger.info("#{new_resource} reloaded")
|
161
178
|
end
|
162
179
|
else
|
163
180
|
logger.trace("#{new_resource.unit_name} is not active, skipping reload.")
|
@@ -167,18 +184,21 @@ class Chef
|
|
167
184
|
def action_try_restart
|
168
185
|
converge_by("try-restarting unit: #{new_resource.unit_name}") do
|
169
186
|
systemctl_execute!("try-restart", new_resource.unit_name, default_env: false)
|
187
|
+
logger.info("#{new_resource} try-restarted")
|
170
188
|
end
|
171
189
|
end
|
172
190
|
|
173
191
|
def action_reload_or_restart
|
174
192
|
converge_by("reload-or-restarting unit: #{new_resource.unit_name}") do
|
175
193
|
systemctl_execute!("reload-or-restart", new_resource.unit_name, default_env: false)
|
194
|
+
logger.info("#{new_resource} reload-or-restarted")
|
176
195
|
end
|
177
196
|
end
|
178
197
|
|
179
198
|
def action_reload_or_try_restart
|
180
199
|
converge_by("reload-or-try-restarting unit: #{new_resource.unit_name}") do
|
181
200
|
systemctl_execute!("reload-or-try-restart", new_resource.unit_name, default_env: false)
|
201
|
+
logger.info("#{new_resource} reload-or-try-restarted")
|
182
202
|
end
|
183
203
|
end
|
184
204
|
|
@@ -198,6 +218,10 @@ class Chef
|
|
198
218
|
systemctl_execute("is-enabled", new_resource.unit_name).stdout.include?("static")
|
199
219
|
end
|
200
220
|
|
221
|
+
def indirect?
|
222
|
+
systemctl_execute("is-enabled", new_resource.unit_name).stdout.include?("indirect")
|
223
|
+
end
|
224
|
+
|
201
225
|
private
|
202
226
|
|
203
227
|
def unit_path
|
@@ -159,6 +159,15 @@ class Chef
|
|
159
159
|
)
|
160
160
|
end
|
161
161
|
|
162
|
+
# if the service is indirect or not
|
163
|
+
def indirect(arg = nil)
|
164
|
+
set_or_return(
|
165
|
+
:indirect,
|
166
|
+
arg,
|
167
|
+
kind_of: [ TrueClass, FalseClass ]
|
168
|
+
)
|
169
|
+
end
|
170
|
+
|
162
171
|
def options(arg = nil)
|
163
172
|
set_or_return(
|
164
173
|
:options,
|
@@ -42,6 +42,7 @@ class Chef
|
|
42
42
|
property :active, [TrueClass, FalseClass], skip_docs: true
|
43
43
|
property :masked, [TrueClass, FalseClass], skip_docs: true
|
44
44
|
property :static, [TrueClass, FalseClass], skip_docs: true
|
45
|
+
property :indirect, [TrueClass, FalseClass], skip_docs: true
|
45
46
|
|
46
47
|
# User-provided properties
|
47
48
|
property :user, String, desired_state: false,
|
data/lib/chef/version.rb
CHANGED
@@ -110,6 +110,13 @@ describe "knife config get", :workstation do
|
|
110
110
|
it { is_expected.to match(/^node_name:\s+one$/) }
|
111
111
|
end
|
112
112
|
|
113
|
+
context "with a config dot d files" do
|
114
|
+
before { file(".chef/config.d/abc.rb", "node_name 'one'\n") }
|
115
|
+
|
116
|
+
it { is_expected.to match(%r{^Loading from .d/ configuration file .*/#{File.basename(path_to("."))}/.chef/config.d/abc.rb$}) }
|
117
|
+
it { is_expected.to match(/^node_name:\s+one$/) }
|
118
|
+
end
|
119
|
+
|
113
120
|
context "with a credentials file and CHEF_HOME" do
|
114
121
|
before do
|
115
122
|
file(".chef/credentials", "[default]\nclient_name = \"three\"\n")
|
@@ -36,11 +36,11 @@ describe Chef::Provider::Service::Systemd do
|
|
36
36
|
let(:provider) { Chef::Provider::Service::Systemd.new(new_resource, run_context) }
|
37
37
|
|
38
38
|
let(:shell_out_success) do
|
39
|
-
double("shell_out", exitstatus: 0, error?: false)
|
39
|
+
double("shell_out", exitstatus: 0, error?: false, stdout: "")
|
40
40
|
end
|
41
41
|
|
42
42
|
let(:shell_out_failure) do
|
43
|
-
double("shell_out", exitstatus: 1, error?: true)
|
43
|
+
double("shell_out", exitstatus: 1, error?: true, stdout: "")
|
44
44
|
end
|
45
45
|
|
46
46
|
let(:current_resource) { Chef::Resource::Service.new(service_name) }
|
@@ -56,6 +56,7 @@ describe Chef::Provider::Service::Systemd do
|
|
56
56
|
allow(provider).to receive(:is_active?).and_return(false)
|
57
57
|
allow(provider).to receive(:is_enabled?).and_return(false)
|
58
58
|
allow(provider).to receive(:is_masked?).and_return(false)
|
59
|
+
allow(provider).to receive(:is_indirect?).and_return(false)
|
59
60
|
end
|
60
61
|
|
61
62
|
it "should create a current resource with the name of the new resource" do
|
@@ -359,6 +360,29 @@ describe Chef::Provider::Service::Systemd do
|
|
359
360
|
expect(provider.is_masked?).to be false
|
360
361
|
end
|
361
362
|
end
|
363
|
+
|
364
|
+
describe "is_indirect?" do
|
365
|
+
before(:each) do
|
366
|
+
provider.current_resource = current_resource
|
367
|
+
current_resource.service_name(service_name)
|
368
|
+
allow(provider).to receive(:which).with("systemctl").and_return(systemctl_path.to_s)
|
369
|
+
end
|
370
|
+
|
371
|
+
it "should return true if '#{systemctl_path} --system is-enabled service_name' returns 'indirect'" do
|
372
|
+
expect(provider).to receive(:shell_out).with("#{systemctl_path} --system is-enabled #{service_name_escaped}", {}).and_return(double(stdout: "indirect", exitstatus: shell_out_success))
|
373
|
+
expect(provider.is_indirect?).to be true
|
374
|
+
end
|
375
|
+
|
376
|
+
it "should return false if '#{systemctl_path} --system is-enabled service_name' returns 0 and outputs something other than 'indirect'" do
|
377
|
+
expect(provider).to receive(:shell_out).with("#{systemctl_path} --system is-enabled #{service_name_escaped}", {}).and_return(double(stdout: "enabled", exitstatus: shell_out_success))
|
378
|
+
expect(provider.is_indirect?).to be false
|
379
|
+
end
|
380
|
+
|
381
|
+
it "should return false if '#{systemctl_path} --system is-enabled service_name' returns anything except 0 and outputs somethign other than 'indirect''" do
|
382
|
+
expect(provider).to receive(:shell_out).with("#{systemctl_path} --system is-enabled #{service_name_escaped}", {}).and_return(double(stdout: "enabled", exitstatus: shell_out_failure))
|
383
|
+
expect(provider.is_indirect?).to be false
|
384
|
+
end
|
385
|
+
end
|
362
386
|
end
|
363
387
|
end
|
364
388
|
end
|
@@ -65,11 +65,19 @@ describe Chef::Provider::SystemdUnit do
|
|
65
65
|
end
|
66
66
|
|
67
67
|
let(:shell_out_masked) do
|
68
|
-
double("shell_out",
|
68
|
+
double("shell_out", exitstatus: 0, error?: false, stdout: "masked")
|
69
69
|
end
|
70
70
|
|
71
71
|
let(:shell_out_static) do
|
72
|
-
double("shell_out",
|
72
|
+
double("shell_out", exitstatus: 0, error?: false, stdout: "static")
|
73
|
+
end
|
74
|
+
|
75
|
+
let(:shell_out_disabled) do
|
76
|
+
double("shell_out", exitstatus: 1, error?: true, stdout: "disabled")
|
77
|
+
end
|
78
|
+
|
79
|
+
let(:shell_out_indirect) do
|
80
|
+
double("shell_out", exitstatus: 0, error?: true, stdout: "indirect")
|
73
81
|
end
|
74
82
|
|
75
83
|
before(:each) do
|
@@ -858,8 +866,8 @@ describe Chef::Provider::SystemdUnit do
|
|
858
866
|
it "returns false when unit is not enabled" do
|
859
867
|
current_resource.user(user_name)
|
860
868
|
expect(provider).to receive(:shell_out_compacted)
|
861
|
-
|
862
|
-
|
869
|
+
.with(systemctl_path, "--user", "is-enabled", unit_name, user_cmd_opts)
|
870
|
+
.and_return(shell_out_disabled)
|
863
871
|
expect(provider.enabled?).to be false
|
864
872
|
end
|
865
873
|
end
|
@@ -874,8 +882,8 @@ describe Chef::Provider::SystemdUnit do
|
|
874
882
|
|
875
883
|
it "returns false when unit is not enabled" do
|
876
884
|
expect(provider).to receive(:shell_out_compacted)
|
877
|
-
|
878
|
-
|
885
|
+
.with(systemctl_path, "--system", "is-enabled", unit_name)
|
886
|
+
.and_return(shell_out_disabled)
|
879
887
|
expect(provider.enabled?).to be false
|
880
888
|
end
|
881
889
|
end
|
@@ -962,6 +970,47 @@ describe Chef::Provider::SystemdUnit do
|
|
962
970
|
end
|
963
971
|
end
|
964
972
|
end
|
973
|
+
|
974
|
+
describe "#indirect?" do
|
975
|
+
before(:each) do
|
976
|
+
provider.current_resource = current_resource
|
977
|
+
allow(provider).to receive(:which).with("systemctl").and_return(systemctl_path.to_s)
|
978
|
+
end
|
979
|
+
|
980
|
+
context "when a user is specified" do
|
981
|
+
it "returns true when the unit is indirect" do
|
982
|
+
current_resource.user(user_name)
|
983
|
+
expect(provider).to receive(:shell_out_compacted)
|
984
|
+
.with(systemctl_path, "--user", "is-enabled", unit_name, user_cmd_opts)
|
985
|
+
.and_return(shell_out_indirect)
|
986
|
+
expect(provider.indirect?).to be true
|
987
|
+
end
|
988
|
+
|
989
|
+
it "returns false when the unit is not indirect" do
|
990
|
+
current_resource.user(user_name)
|
991
|
+
expect(provider).to receive(:shell_out_compacted)
|
992
|
+
.with(systemctl_path, "--user", "is-enabled", unit_name, user_cmd_opts)
|
993
|
+
.and_return(shell_out_static)
|
994
|
+
expect(provider.indirect?).to be false
|
995
|
+
end
|
996
|
+
end
|
997
|
+
|
998
|
+
context "when no user is specified" do
|
999
|
+
it "returns true when the unit is indirect" do
|
1000
|
+
expect(provider).to receive(:shell_out_compacted)
|
1001
|
+
.with(systemctl_path, "--system", "is-enabled", unit_name)
|
1002
|
+
.and_return(shell_out_indirect)
|
1003
|
+
expect(provider.indirect?).to be true
|
1004
|
+
end
|
1005
|
+
|
1006
|
+
it "returns false when the unit is not indirect" do
|
1007
|
+
expect(provider).to receive(:shell_out_compacted)
|
1008
|
+
.with(systemctl_path, "--system", "is-enabled", unit_name)
|
1009
|
+
.and_return(shell_out_static)
|
1010
|
+
expect(provider.indirect?).to be false
|
1011
|
+
end
|
1012
|
+
end
|
1013
|
+
end
|
965
1014
|
end
|
966
1015
|
end
|
967
1016
|
end
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: chef
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 14.14.
|
4
|
+
version: 14.14.29
|
5
5
|
platform: universal-mingw32
|
6
6
|
authors:
|
7
7
|
- Adam Jacob
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2019-
|
11
|
+
date: 2019-11-06 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: chef-config
|
@@ -16,14 +16,14 @@ dependencies:
|
|
16
16
|
requirements:
|
17
17
|
- - '='
|
18
18
|
- !ruby/object:Gem::Version
|
19
|
-
version: 14.14.
|
19
|
+
version: 14.14.29
|
20
20
|
type: :runtime
|
21
21
|
prerelease: false
|
22
22
|
version_requirements: !ruby/object:Gem::Requirement
|
23
23
|
requirements:
|
24
24
|
- - '='
|
25
25
|
- !ruby/object:Gem::Version
|
26
|
-
version: 14.14.
|
26
|
+
version: 14.14.29
|
27
27
|
- !ruby/object:Gem::Dependency
|
28
28
|
name: mixlib-cli
|
29
29
|
requirement: !ruby/object:Gem::Requirement
|