chef 16.1.16-universal-mingw32 → 16.2.44-universal-mingw32

Sign up to get free protection for your applications and to get access to all the features.
Files changed (160) hide show
  1. checksums.yaml +4 -4
  2. data/Gemfile +2 -3
  3. data/README.md +3 -3
  4. data/Rakefile +2 -2
  5. data/chef.gemspec +3 -3
  6. data/lib/chef/application/apply.rb +1 -1
  7. data/lib/chef/application/base.rb +1 -1
  8. data/lib/chef/application/client.rb +1 -1
  9. data/lib/chef/application/windows_service_manager.rb +1 -1
  10. data/lib/chef/chef_fs/data_handler/data_bag_item_data_handler.rb +1 -1
  11. data/lib/chef/chef_fs/path_utils.rb +1 -1
  12. data/lib/chef/cookbook/chefignore.rb +1 -1
  13. data/lib/chef/cookbook/metadata.rb +1 -1
  14. data/lib/chef/cookbook_version.rb +2 -2
  15. data/lib/chef/data_bag.rb +4 -4
  16. data/lib/chef/deprecated.rb +4 -0
  17. data/lib/chef/file_access_control.rb +1 -1
  18. data/lib/chef/formatters/error_inspectors/compile_error_inspector.rb +1 -1
  19. data/lib/chef/formatters/error_inspectors/resource_failure_inspector.rb +3 -3
  20. data/lib/chef/http.rb +17 -2
  21. data/lib/chef/http/http_request.rb +1 -1
  22. data/lib/chef/http/json_output.rb +1 -1
  23. data/lib/chef/http/ssl_policies.rb +18 -0
  24. data/lib/chef/knife.rb +1 -1
  25. data/lib/chef/knife/bootstrap.rb +3 -6
  26. data/lib/chef/knife/bootstrap/templates/chef-full.erb +9 -9
  27. data/lib/chef/knife/client_bulk_delete.rb +1 -1
  28. data/lib/chef/knife/config_get.rb +1 -1
  29. data/lib/chef/knife/cookbook_delete.rb +1 -1
  30. data/lib/chef/knife/core/cookbook_scm_repo.rb +1 -1
  31. data/lib/chef/knife/data_bag_create.rb +1 -1
  32. data/lib/chef/knife/node_bulk_delete.rb +1 -1
  33. data/lib/chef/knife/node_run_list_remove.rb +1 -1
  34. data/lib/chef/knife/role_bulk_delete.rb +1 -1
  35. data/lib/chef/knife/ssh.rb +1 -1
  36. data/lib/chef/knife/supermarket_share.rb +1 -1
  37. data/lib/chef/knife/supermarket_unshare.rb +1 -1
  38. data/lib/chef/log.rb +1 -1
  39. data/lib/chef/mixin/securable.rb +2 -2
  40. data/lib/chef/powershell.rb +1 -1
  41. data/lib/chef/provider/batch.rb +3 -10
  42. data/lib/chef/provider/cron.rb +2 -14
  43. data/lib/chef/provider/execute.rb +2 -1
  44. data/lib/chef/provider/group/dscl.rb +2 -2
  45. data/lib/chef/provider/group/windows.rb +1 -1
  46. data/lib/chef/provider/ifconfig.rb +7 -7
  47. data/lib/chef/provider/mount/aix.rb +1 -1
  48. data/lib/chef/provider/mount/windows.rb +2 -2
  49. data/lib/chef/provider/noop.rb +1 -1
  50. data/lib/chef/provider/package/openbsd.rb +1 -1
  51. data/lib/chef/provider/package/portage.rb +2 -2
  52. data/lib/chef/provider/package/powershell.rb +6 -2
  53. data/lib/chef/provider/package/rubygems.rb +2 -2
  54. data/lib/chef/provider/package/snap.rb +96 -27
  55. data/lib/chef/provider/package/windows/msi.rb +3 -3
  56. data/lib/chef/provider/package/windows/registry_uninstall_entry.rb +1 -1
  57. data/lib/chef/provider/powershell_script.rb +10 -14
  58. data/lib/chef/provider/remote_file/http.rb +4 -1
  59. data/lib/chef/provider/script.rb +4 -75
  60. data/lib/chef/provider/service/arch.rb +1 -1
  61. data/lib/chef/provider/service/debian.rb +2 -2
  62. data/lib/chef/provider/service/openbsd.rb +4 -4
  63. data/lib/chef/provider/service/redhat.rb +1 -1
  64. data/lib/chef/provider/service/windows.rb +1 -1
  65. data/lib/chef/provider/subversion.rb +2 -2
  66. data/lib/chef/provider/user/dscl.rb +4 -4
  67. data/lib/chef/provider/user/linux.rb +3 -3
  68. data/lib/chef/provider/user/mac.rb +5 -5
  69. data/lib/chef/provider/windows_script.rb +87 -25
  70. data/lib/chef/provider/zypper_repository.rb +30 -10
  71. data/lib/chef/resource.rb +22 -11
  72. data/lib/chef/resource/apt_package.rb +1 -1
  73. data/lib/chef/resource/archive_file.rb +28 -8
  74. data/lib/chef/resource/bash.rb +0 -1
  75. data/lib/chef/resource/batch.rb +4 -2
  76. data/lib/chef/resource/chef_client_scheduled_task.rb +13 -1
  77. data/lib/chef/resource/cron/_cron_shared.rb +98 -0
  78. data/lib/chef/resource/cron/cron.rb +46 -0
  79. data/lib/chef/resource/{cron_d.rb → cron/cron_d.rb} +7 -87
  80. data/lib/chef/resource/cron_access.rb +11 -3
  81. data/lib/chef/resource/csh.rb +0 -1
  82. data/lib/chef/resource/execute.rb +477 -7
  83. data/lib/chef/resource/file.rb +1 -1
  84. data/lib/chef/resource/freebsd_package.rb +1 -1
  85. data/lib/chef/resource/helpers/cron_validations.rb +6 -3
  86. data/lib/chef/resource/homebrew_package.rb +30 -1
  87. data/lib/chef/resource/homebrew_update.rb +107 -0
  88. data/lib/chef/resource/hostname.rb +6 -19
  89. data/lib/chef/resource/kernel_module.rb +14 -1
  90. data/lib/chef/resource/mount.rb +1 -1
  91. data/lib/chef/resource/perl.rb +0 -1
  92. data/lib/chef/resource/plist.rb +23 -4
  93. data/lib/chef/resource/powershell_script.rb +4 -2
  94. data/lib/chef/resource/python.rb +0 -1
  95. data/lib/chef/resource/remote_file.rb +26 -10
  96. data/lib/chef/resource/ruby.rb +0 -1
  97. data/lib/chef/resource/template.rb +1 -1
  98. data/lib/chef/resource/windows_ad_join.rb +30 -1
  99. data/lib/chef/resource/windows_audit_policy.rb +227 -0
  100. data/lib/chef/resource/windows_auto_run.rb +11 -0
  101. data/lib/chef/resource/windows_certificate.rb +26 -0
  102. data/lib/chef/resource/windows_font.rb +3 -3
  103. data/lib/chef/resource/windows_package.rb +1 -1
  104. data/lib/chef/resource/windows_pagefile.rb +1 -1
  105. data/lib/chef/resource/windows_script.rb +2 -16
  106. data/lib/chef/resource/windows_security_policy.rb +17 -15
  107. data/lib/chef/resource/windows_shortcut.rb +1 -2
  108. data/lib/chef/resource/windows_task.rb +4 -4
  109. data/lib/chef/resource/windows_user_privilege.rb +5 -5
  110. data/lib/chef/resource/yum_repository.rb +9 -9
  111. data/lib/chef/resources.rb +4 -2
  112. data/lib/chef/search/query.rb +1 -1
  113. data/lib/chef/util/diff.rb +2 -2
  114. data/lib/chef/util/windows/net_user.rb +1 -1
  115. data/lib/chef/util/windows/volume.rb +1 -1
  116. data/lib/chef/version.rb +1 -1
  117. data/lib/chef/win32/file.rb +1 -1
  118. data/lib/chef/win32/registry.rb +2 -2
  119. data/lib/chef/win32/security.rb +1 -1
  120. data/spec/data/lwrp/providers/buck_passer.rb +1 -1
  121. data/spec/data/lwrp/providers/buck_passer_2.rb +1 -1
  122. data/spec/data/lwrp/providers/embedded_resource_accesses_providers_scope.rb +1 -1
  123. data/spec/functional/resource/cron_spec.rb +10 -0
  124. data/spec/functional/resource/remote_file_spec.rb +2 -2
  125. data/spec/functional/resource/windows_task_spec.rb +8 -8
  126. data/spec/support/platform_helpers.rb +1 -1
  127. data/spec/support/platforms/win32/spec_service.rb +1 -1
  128. data/spec/support/shared/functional/execute_resource.rb +1 -1
  129. data/spec/support/shared/unit/execute_resource.rb +1 -1
  130. data/spec/unit/application_spec.rb +7 -0
  131. data/spec/unit/data_bag_spec.rb +1 -1
  132. data/spec/unit/http/ssl_policies_spec.rb +20 -0
  133. data/spec/unit/knife/bootstrap_spec.rb +2 -2
  134. data/spec/unit/mixin/user_context_spec.rb +1 -9
  135. data/spec/unit/property_spec.rb +1 -1
  136. data/spec/unit/provider/batch_spec.rb +130 -0
  137. data/spec/unit/provider/cron_spec.rb +9 -49
  138. data/spec/unit/provider/package/powershell_spec.rb +95 -86
  139. data/spec/unit/provider/package/snap_spec.rb +1 -1
  140. data/spec/unit/provider/powershell_script_spec.rb +3 -45
  141. data/spec/unit/provider/script_spec.rb +20 -110
  142. data/spec/unit/provider/zypper_repository_spec.rb +60 -10
  143. data/spec/unit/resource/archive_file_spec.rb +11 -2
  144. data/spec/unit/resource/chef_client_scheduled_task_spec.rb +17 -7
  145. data/spec/unit/resource/cron_spec.rb +2 -2
  146. data/spec/unit/resource/helpers/cron_validations_spec.rb +5 -1
  147. data/spec/unit/resource/homebrew_update_spec.rb +30 -0
  148. data/spec/unit/resource/powershell_script_spec.rb +10 -15
  149. data/spec/unit/resource/timezone_spec.rb +1 -1
  150. data/spec/unit/resource/windows_audit_policy_spec.rb +64 -0
  151. data/spec/unit/resource/windows_dns_record_spec.rb +3 -3
  152. data/spec/unit/resource/windows_dns_zone_spec.rb +2 -2
  153. data/spec/unit/resource/windows_task_spec.rb +1 -1
  154. data/spec/unit/resource/windows_uac_spec.rb +2 -2
  155. data/spec/unit/resource/yum_repository_spec.rb +21 -21
  156. data/spec/unit/resource_spec.rb +67 -1
  157. data/spec/unit/util/dsc/configuration_generator_spec.rb +1 -1
  158. data/spec/unit/util/threaded_job_queue_spec.rb +9 -0
  159. metadata +22 -22
  160. data/lib/chef/resource/cron.rb +0 -157
@@ -18,7 +18,7 @@
18
18
 
19
19
  # TODO: Allow new_resource.source to be a Product Code as a GUID for uninstall / network install
20
20
 
21
- require_relative "../../../win32/api/installer" if RUBY_PLATFORM =~ /mswin|mingw32|windows/
21
+ require_relative "../../../win32/api/installer" if RUBY_PLATFORM.match?(/mswin|mingw32|windows/)
22
22
  require_relative "../../../mixin/shell_out"
23
23
 
24
24
  class Chef
@@ -26,7 +26,7 @@ class Chef
26
26
  class Package
27
27
  class Windows
28
28
  class MSI
29
- include Chef::ReservedNames::Win32::API::Installer if RUBY_PLATFORM =~ /mswin|mingw32|windows/
29
+ include Chef::ReservedNames::Win32::API::Installer if RUBY_PLATFORM.match?(/mswin|mingw32|windows/)
30
30
  include Chef::Mixin::ShellOut
31
31
 
32
32
  def initialize(resource, uninstall_entries)
@@ -84,7 +84,7 @@ class Chef
84
84
  .map(&:uninstall_string).uniq.each do |uninstall_string|
85
85
  uninstall_string = "msiexec /x #{uninstall_string.match(/{.*}/)}"
86
86
  uninstall_string += expand_options(new_resource.options)
87
- uninstall_string += " /q" unless uninstall_string.downcase =~ %r{ /q}
87
+ uninstall_string += " /q" unless %r{ /q}.match?(uninstall_string.downcase)
88
88
  logger.trace("#{new_resource} removing MSI package version using '#{uninstall_string}'")
89
89
  shell_out!(uninstall_string, default_env: false, timeout: new_resource.timeout, returns: new_resource.returns)
90
90
  end
@@ -17,7 +17,7 @@
17
17
  # limitations under the License.
18
18
  #
19
19
 
20
- require "win32/registry" if RUBY_PLATFORM =~ /mswin|mingw32|windows/
20
+ require "win32/registry" if RUBY_PLATFORM.match?(/mswin|mingw32|windows/)
21
21
 
22
22
  class Chef
23
23
  class Provider
@@ -26,19 +26,12 @@ class Chef
26
26
 
27
27
  provides :powershell_script
28
28
 
29
- def initialize(new_resource, run_context)
30
- super(new_resource, run_context, ".ps1")
31
- add_exit_status_wrapper
32
- end
33
-
34
29
  action :run do
35
30
  validate_script_syntax!
36
31
  super()
37
32
  end
38
33
 
39
34
  def command
40
- basepath = is_forced_32bit ? wow64_directory : run_context.node["kernel"]["os_info"]["system_directory"]
41
-
42
35
  # Powershell.exe is always in "v1.0" folder (for backwards compatibility)
43
36
  interpreter_path = Chef::Util::PathHelper.join(basepath, "WindowsPowerShell", "v1.0", interpreter)
44
37
 
@@ -48,21 +41,19 @@ class Chef
48
41
  # error status of a failed Windows process that ran at the
49
42
  # end of the script, it gets changed to '1'.
50
43
  #
51
- "\"#{interpreter_path}\" #{new_resource.flags} -File \"#{script_file.path}\""
44
+ "\"#{interpreter_path}\" #{new_resource.flags} -File \"#{script_file_path}\""
52
45
  end
53
46
 
54
47
  protected
55
48
 
56
- # Process exit codes are strange with PowerShell and require
57
- # special handling to cover common use cases.
58
- def add_exit_status_wrapper
59
- self.code = wrapper_script
49
+ def code
50
+ code = wrapper_script
60
51
  logger.trace("powershell_script provider called with script code:\n\n#{new_resource.code}\n")
61
52
  logger.trace("powershell_script provider will execute transformed code:\n\n#{code}\n")
53
+ code
62
54
  end
63
55
 
64
56
  def validate_script_syntax!
65
- interpreter_arguments = new_resource.flags
66
57
  Tempfile.open(["chef_powershell_script-user-code", ".ps1"]) do |user_script_file|
67
58
  # Wrap the user's code in a PowerShell script block so that
68
59
  # it isn't executed. However, syntactically invalid script
@@ -80,7 +71,7 @@ class Chef
80
71
  # written to the file system at this point, which is required since
81
72
  # the intent is to execute the code just written to it.
82
73
  user_script_file.close
83
- validation_command = "\"#{interpreter}\" #{interpreter_arguments} -Command \". '#{user_script_file.path}'\""
74
+ validation_command = "\"#{interpreter}\" #{new_resource.flags} -Command \". '#{user_script_file.path}'\""
84
75
 
85
76
  # Note that other script providers like bash allow syntax errors
86
77
  # to be suppressed by setting 'returns' to a value that the
@@ -99,6 +90,8 @@ class Chef
99
90
  end
100
91
  end
101
92
 
93
+ # Process exit codes are strange with PowerShell and require
94
+ # special handling to cover common use cases.
102
95
  # A wrapper script is used to launch user-supplied script while
103
96
  # still obtaining useful process exit codes. Unless you
104
97
  # explicitly call exit in PowerShell, the powershell.exe
@@ -182,6 +175,9 @@ class Chef
182
175
  EOH
183
176
  end
184
177
 
178
+ def script_extension
179
+ ".ps1"
180
+ end
185
181
  end
186
182
  end
187
183
  end
@@ -130,10 +130,13 @@ class Chef
130
130
  # which tricks Chef::REST into decompressing the response body. In this
131
131
  # case you'd end up with a tar archive (no gzip) named, e.g., foo.tgz,
132
132
  # which is not what you wanted.
133
- if uri.to_s =~ /gz$/
133
+ if /gz$/.match?(uri.to_s)
134
134
  logger.trace("Turning gzip compression off due to filename ending in gz")
135
135
  opts[:disable_gzip] = true
136
136
  end
137
+ if new_resource.ssl_verify_mode
138
+ opts[:ssl_verify_mode] = new_resource.ssl_verify_mode
139
+ end
137
140
  opts
138
141
  end
139
142
 
@@ -16,9 +16,7 @@
16
16
  # limitations under the License.
17
17
  #
18
18
 
19
- require "tempfile" unless defined?(Tempfile)
20
19
  require_relative "execute"
21
- require_relative "../win32/security" if ChefUtils.windows?
22
20
  require "forwardable" unless defined?(Forwardable)
23
21
 
24
22
  class Chef
@@ -34,84 +32,15 @@ class Chef
34
32
  provides :ruby
35
33
  provides :script
36
34
 
37
- def_delegators :new_resource, :interpreter, :flags
38
-
39
- attr_accessor :code
40
-
41
- def initialize(new_resource, run_context)
42
- super
43
- self.code = new_resource.code
44
- end
35
+ def_delegators :new_resource, :interpreter, :flags, :code
45
36
 
46
37
  def command
47
- "\"#{interpreter}\" #{flags} \"#{script_file.path}\""
48
- end
49
-
50
- def load_current_resource
51
- super
52
- end
53
-
54
- action :run do
55
- script_file.puts(code)
56
- script_file.close
57
-
58
- set_owner_and_group
59
-
60
- super()
61
-
62
- unlink_script_file
63
- end
64
-
65
- def set_owner_and_group
66
- if ChefUtils.windows?
67
- # And on Windows also this is a no-op if there is no user specified.
68
- grant_alternate_user_read_access
69
- else
70
- # FileUtils itself implements a no-op if +user+ or +group+ are nil
71
- # You can prove this by running FileUtils.chown(nil,nil,'/tmp/file')
72
- # as an unprivileged user.
73
- FileUtils.chown(new_resource.user, new_resource.group, script_file.path)
74
- end
38
+ "\"#{interpreter}\" #{flags}"
75
39
  end
76
40
 
77
- def grant_alternate_user_read_access
78
- # Do nothing if an alternate user isn't specified -- the file
79
- # will already have the correct permissions for the user as part
80
- # of the default ACL behavior on Windows.
81
- return if new_resource.user.nil?
82
-
83
- # Duplicate the script file's existing DACL
84
- # so we can add an ACE later
85
- securable_object = Chef::ReservedNames::Win32::Security::SecurableObject.new(script_file.path)
86
- aces = securable_object.security_descriptor.dacl.reduce([]) { |result, current| result.push(current) }
87
-
88
- username = new_resource.user
89
-
90
- if new_resource.domain
91
- username = new_resource.domain + '\\' + new_resource.user
92
- end
93
-
94
- # Create an ACE that allows the alternate user read access to the script
95
- # file so it can be read and executed.
96
- user_sid = Chef::ReservedNames::Win32::Security::SID.from_account(username)
97
- read_ace = Chef::ReservedNames::Win32::Security::ACE.access_allowed(user_sid, Chef::ReservedNames::Win32::API::Security::GENERIC_READ | Chef::ReservedNames::Win32::API::Security::GENERIC_EXECUTE, 0)
98
- aces.push(read_ace)
99
- acl = Chef::ReservedNames::Win32::Security::ACL.create(aces)
100
-
101
- # This actually applies the modified DACL to the file
102
- # Use parentheses to bypass RuboCop / ChefStyle warning
103
- # about useless setter
104
- (securable_object.dacl = acl)
41
+ def input
42
+ code
105
43
  end
106
-
107
- def script_file
108
- @script_file ||= Tempfile.open("chef-script")
109
- end
110
-
111
- def unlink_script_file
112
- script_file && script_file.close!
113
- end
114
-
115
44
  end
116
45
  end
117
46
  end
@@ -33,7 +33,7 @@ class Chef::Provider::Service::Arch < Chef::Provider::Service::Init
33
33
 
34
34
  def load_current_resource
35
35
  raise Chef::Exceptions::Service, "Could not find /etc/rc.conf" unless ::File.exists?("/etc/rc.conf")
36
- raise Chef::Exceptions::Service, "No DAEMONS found in /etc/rc.conf" unless ::File.read("/etc/rc.conf") =~ /DAEMONS=\((.*)\)/m
36
+ raise Chef::Exceptions::Service, "No DAEMONS found in /etc/rc.conf" unless /DAEMONS=\((.*)\)/m.match?(::File.read("/etc/rc.conf"))
37
37
 
38
38
  super
39
39
 
@@ -76,9 +76,9 @@ class Chef
76
76
 
77
77
  in_info = false
78
78
  ::File.readlines(path).each_with_object([]) do |line, acc|
79
- if line =~ /^### BEGIN INIT INFO/
79
+ if /^### BEGIN INIT INFO/.match?(line)
80
80
  in_info = true
81
- elsif line =~ /^### END INIT INFO/
81
+ elsif /^### END INIT INFO/.match?(line)
82
82
  break acc
83
83
  elsif in_info
84
84
  if line =~ /Default-(Start|Stop):\s+(\d.*)/
@@ -91,7 +91,7 @@ class Chef
91
91
  old_services_list = rc_conf_local.match(/^pkg_scripts="(.*)"/)
92
92
  old_services_list = old_services_list ? old_services_list[1].split(" ") : []
93
93
  new_services_list = old_services_list + [new_resource.service_name]
94
- if rc_conf_local =~ /^pkg_scripts="(.*)"/
94
+ if /^pkg_scripts="(.*)"/.match?(rc_conf_local)
95
95
  new_rcl = rc_conf_local.sub(/^pkg_scripts="(.*)"/, "pkg_scripts=\"#{new_services_list.join(" ")}\"")
96
96
  else
97
97
  new_rcl = rc_conf_local + "\n" + "pkg_scripts=\"#{new_services_list.join(" ")}\"\n"
@@ -158,7 +158,7 @@ class Chef
158
158
  result = false
159
159
  var_name = builtin_service_enable_variable_name
160
160
  if var_name
161
- if rc_conf =~ /^#{Regexp.escape(var_name)}=(.*)/
161
+ if /^#{Regexp.escape(var_name)}=(.*)/.match?(rc_conf)
162
162
  result = true
163
163
  end
164
164
  end
@@ -170,7 +170,7 @@ class Chef
170
170
  var_name = builtin_service_enable_variable_name
171
171
  if var_name
172
172
  if m = rc_conf.match(/^#{Regexp.escape(var_name)}=(.*)/)
173
- unless m[1] =~ /"?[Nn][Oo]"?/
173
+ unless /"?[Nn][Oo]"?/.match?(m[1])
174
174
  result = true
175
175
  end
176
176
  end
@@ -186,7 +186,7 @@ class Chef
186
186
  if var_name
187
187
  if m = rc_conf_local.match(/^#{Regexp.escape(var_name)}=(.*)/)
188
188
  @enabled_state_found = true
189
- unless m[1] =~ /"?[Nn][Oo]"?/ # e.g. looking for httpd_flags=NO
189
+ unless /"?[Nn][Oo]"?/.match?(m[1]) # e.g. looking for httpd_flags=NO
190
190
  result = true
191
191
  end
192
192
  end
@@ -87,7 +87,7 @@ class Chef
87
87
  chkconfig.stdout.split(/\s+/)[1..-1].each do |level|
88
88
  index = level.split(":").first
89
89
  status = level.split(":").last
90
- if level =~ CHKCONFIG_ON
90
+ if CHKCONFIG_ON.match?(level)
91
91
  @current_run_levels << index.to_i
92
92
  all_levels_match = false unless run_levels.include?(index.to_i)
93
93
  else
@@ -20,7 +20,7 @@
20
20
 
21
21
  require_relative "simple"
22
22
  require_relative "../../win32_service_constants"
23
- if RUBY_PLATFORM =~ /mswin|mingw32|windows/
23
+ if RUBY_PLATFORM.match?(/mswin|mingw32|windows/)
24
24
  require_relative "../../win32/error"
25
25
  require "win32/service"
26
26
  end
@@ -122,7 +122,7 @@ class Chef
122
122
  # If the specified revision is an integer, trust it.
123
123
  def revision_int
124
124
  @revision_int ||= begin
125
- if new_resource.revision =~ /^\d+$/
125
+ if /^\d+$/.match?(new_resource.revision)
126
126
  new_resource.revision
127
127
  else
128
128
  command = scm(:info, new_resource.repository, new_resource.svn_info_args, authentication, "-r#{new_resource.revision}")
@@ -211,7 +211,7 @@ class Chef
211
211
 
212
212
  def scm(*args)
213
213
  binary = svn_binary
214
- binary = "\"#{binary}\"" if binary =~ /\s/
214
+ binary = "\"#{binary}\"" if /\s/.match?(binary)
215
215
  [binary, *args].compact.join(" ")
216
216
  end
217
217
 
@@ -215,7 +215,7 @@ in 'password', with the associated 'salt' and 'iterations'.")
215
215
  next_uid_guess = base_uid
216
216
  users_uids = run_dscl("list", "/Users", "uid")
217
217
  while next_uid_guess < search_limit + base_uid
218
- if users_uids =~ Regexp.new("#{Regexp.escape(next_uid_guess.to_s)}\n")
218
+ if users_uids&.match?(Regexp.new("#{Regexp.escape(next_uid_guess.to_s)}\n"))
219
219
  next_uid_guess += 1
220
220
  else
221
221
  uid = next_uid_guess
@@ -291,7 +291,7 @@ in 'password', with the associated 'salt' and 'iterations'.")
291
291
  end
292
292
 
293
293
  def validate_home_dir_specification!
294
- unless new_resource.home =~ %r{^/}
294
+ unless %r{^/}.match?(new_resource.home)
295
295
  raise(Chef::Exceptions::InvalidHomeDirectory, "invalid path spec for User: '#{new_resource.username}', home directory: '#{new_resource.home}'")
296
296
  end
297
297
  end
@@ -536,7 +536,7 @@ in 'password', with the associated 'salt' and 'iterations'.")
536
536
 
537
537
  # We flush the cache here in order to make sure that we read fresh information
538
538
  # for the user.
539
- shell_out("dscacheutil", "-flushcache") # FIXME: this is MacOS version dependent
539
+ shell_out("dscacheutil", "-flushcache") # FIXME: this is macOS version dependent
540
540
 
541
541
  begin
542
542
  user_plist_file = "#{USER_PLIST_DIRECTORY}/#{new_resource.username}.plist"
@@ -587,7 +587,7 @@ in 'password', with the associated 'salt' and 'iterations'.")
587
587
  result = shell_out("dscl", ".", "-#{args[0]}", args[1..-1])
588
588
  return "" if ( args.first =~ /^delete/ ) && ( result.exitstatus != 0 )
589
589
  raise(Chef::Exceptions::DsclCommandFailed, "dscl error: #{result.inspect}") unless result.exitstatus == 0
590
- raise(Chef::Exceptions::DsclCommandFailed, "dscl error: #{result.inspect}") if result.stdout =~ /No such key: /
590
+ raise(Chef::Exceptions::DsclCommandFailed, "dscl error: #{result.inspect}") if /No such key: /.match?(result.stdout)
591
591
 
592
592
  result.stdout
593
593
  end
@@ -96,7 +96,7 @@ class Chef
96
96
  passwd_s = shell_out("passwd", "-S", new_resource.username, returns: [ 0, 1 ])
97
97
 
98
98
  # checking "does not exist" has to come before exit code handling since centos and ubuntu differ in exit codes
99
- if passwd_s.stderr =~ /does not exist/
99
+ if /does not exist/.match?(passwd_s.stderr)
100
100
  return false if whyrun_mode?
101
101
 
102
102
  raise Chef::Exceptions::User, "User #{new_resource.username} does not exist when checking lock status for #{new_resource}"
@@ -108,8 +108,8 @@ class Chef
108
108
  # now the actual output parsing
109
109
  @locked = nil
110
110
  status_line = passwd_s.stdout.split(" ")
111
- @locked = false if status_line[1] =~ /^[PN]/
112
- @locked = true if status_line[1] =~ /^L/
111
+ @locked = false if /^[PN]/.match?(status_line[1])
112
+ @locked = true if /^L/.match?(status_line[1])
113
113
 
114
114
  raise Chef::Exceptions::User, "Cannot determine if user #{new_resource.username} is locked for #{new_resource}" if @locked.nil?
115
115
 
@@ -163,7 +163,7 @@ class Chef
163
163
  # a problem. We'll check stderr and make sure we see that it finished
164
164
  # correctly.
165
165
  res = run_sysadminctl(cmd)
166
- unless res.downcase =~ /creating user/
166
+ unless /creating user/.match?(res.downcase)
167
167
  raise Chef::Exceptions::User, "error when creating user: #{res}"
168
168
  end
169
169
 
@@ -309,7 +309,7 @@ class Chef
309
309
  # sysadminctl doesn't exit with a non-zero exit code if it encounters
310
310
  # a problem. We'll check stderr and make sure we see that it finished
311
311
  res = run_sysadminctl(cmd)
312
- unless res.downcase =~ /deleting record|not found/
312
+ unless /deleting record|not found/.match?(res.downcase)
313
313
  raise Chef::Exceptions::User, "error deleting user: #{res}"
314
314
  end
315
315
 
@@ -372,7 +372,7 @@ class Chef
372
372
  next_uid_guess = base_uid
373
373
  users_uids = run_dscl("list", "/Users", "uid")
374
374
  while next_uid_guess < search_limit + base_uid
375
- if users_uids =~ Regexp.new("#{Regexp.escape(next_uid_guess.to_s)}\n")
375
+ if users_uids&.match?(Regexp.new("#{Regexp.escape(next_uid_guess.to_s)}\n"))
376
376
  next_uid_guess += 1
377
377
  else
378
378
  uid = next_uid_guess
@@ -430,7 +430,7 @@ class Chef
430
430
  # sysadminctl doesn't exit with a non-zero exit code if it encounters
431
431
  # a problem. We'll check stderr and make sure we see that it finished
432
432
  res = run_sysadminctl(cmd)
433
- unless res.downcase =~ /done/
433
+ unless /done/.match?(res.downcase)
434
434
  raise Chef::Exceptions::User, "error when modifying SecureToken: #{res}"
435
435
  end
436
436
 
@@ -611,7 +611,7 @@ class Chef
611
611
  result = shell_out("dscl", "-plist", ".", "-#{args[0]}", args[1..-1])
612
612
  return "" if ( args.first =~ /^delete/ ) && ( result.exitstatus != 0 )
613
613
  raise(Chef::Exceptions::DsclCommandFailed, "dscl error: #{result.inspect}") unless result.exitstatus == 0
614
- raise(Chef::Exceptions::DsclCommandFailed, "dscl error: #{result.inspect}") if result.stdout =~ /No such key: /
614
+ raise(Chef::Exceptions::DsclCommandFailed, "dscl error: #{result.inspect}") if /No such key: /.match?(result.stdout)
615
615
 
616
616
  result.stdout
617
617
  end
@@ -18,57 +18,119 @@
18
18
 
19
19
  require_relative "script"
20
20
  require_relative "../mixin/windows_architecture_helper"
21
+ require_relative "../win32/security" if ChefUtils.windows?
22
+ require "tempfile" unless defined?(Tempfile)
21
23
 
22
24
  class Chef
23
25
  class Provider
24
26
  class WindowsScript < Chef::Provider::Script
25
27
 
26
- attr_reader :is_forced_32bit
27
-
28
28
  protected
29
29
 
30
- include Chef::Mixin::WindowsArchitectureHelper
31
-
32
- def initialize( new_resource, run_context, script_extension = "")
33
- super( new_resource, run_context )
34
- @script_extension = script_extension
30
+ attr_accessor :script_file_path
35
31
 
36
- target_architecture = if new_resource.architecture.nil?
37
- node_windows_architecture(run_context.node)
38
- else
39
- new_resource.architecture
40
- end
41
-
42
- @is_wow64 = wow64_architecture_override_required?(run_context.node, target_architecture)
32
+ include Chef::Mixin::WindowsArchitectureHelper
43
33
 
44
- @is_forced_32bit = forced_32bit_override_required?(run_context.node, target_architecture)
34
+ def target_architecture
35
+ @target_architecture ||= if new_resource.architecture.nil?
36
+ node_windows_architecture(run_context.node)
37
+ else
38
+ new_resource.architecture
39
+ end
45
40
  end
46
41
 
47
- public
42
+ def basepath
43
+ if forced_32bit_override_required?(run_context.node, target_architecture)
44
+ wow64_directory
45
+ else
46
+ run_context.node["kernel"]["os_info"]["system_directory"]
47
+ end
48
+ end
48
49
 
49
- action :run do
50
+ def with_wow64_redirection_disabled
50
51
  wow64_redirection_state = nil
51
52
 
52
- if @is_wow64
53
- wow64_redirection_state = disable_wow64_file_redirection(@run_context.node)
53
+ if wow64_architecture_override_required?(run_context.node, target_architecture)
54
+ wow64_redirection_state = disable_wow64_file_redirection(run_context.node)
54
55
  end
55
56
 
56
57
  begin
57
- super()
58
+ yield
58
59
  rescue
59
60
  raise
60
61
  ensure
61
62
  unless wow64_redirection_state.nil?
62
- restore_wow64_file_redirection(@run_context.node, wow64_redirection_state)
63
+ restore_wow64_file_redirection(run_context.node, wow64_redirection_state)
63
64
  end
64
65
  end
65
66
  end
66
67
 
67
- def script_file
68
- base_script_name = "chef-script"
69
- temp_file_arguments = [ base_script_name, @script_extension ]
68
+ def command
69
+ "\"#{interpreter}\" #{flags} \"#{script_file_path}\""
70
+ end
71
+
72
+ def grant_alternate_user_read_access(file_path)
73
+ # Do nothing if an alternate user isn't specified -- the file
74
+ # will already have the correct permissions for the user as part
75
+ # of the default ACL behavior on Windows.
76
+ return if new_resource.user.nil?
77
+
78
+ # Duplicate the script file's existing DACL
79
+ # so we can add an ACE later
80
+ securable_object = Chef::ReservedNames::Win32::Security::SecurableObject.new(file_path)
81
+ aces = securable_object.security_descriptor.dacl.reduce([]) { |result, current| result.push(current) }
82
+
83
+ username = new_resource.user
84
+
85
+ if new_resource.domain
86
+ username = new_resource.domain + '\\' + new_resource.user
87
+ end
88
+
89
+ # Create an ACE that allows the alternate user read access to the script
90
+ # file so it can be read and executed.
91
+ user_sid = Chef::ReservedNames::Win32::Security::SID.from_account(username)
92
+ read_ace = Chef::ReservedNames::Win32::Security::ACE.access_allowed(user_sid, Chef::ReservedNames::Win32::API::Security::GENERIC_READ | Chef::ReservedNames::Win32::API::Security::GENERIC_EXECUTE, 0)
93
+ aces.push(read_ace)
94
+ acl = Chef::ReservedNames::Win32::Security::ACL.create(aces)
95
+
96
+ # This actually applies the modified DACL to the file
97
+ # Use parentheses to bypass RuboCop / ChefStyle warning
98
+ # about useless setter
99
+ (securable_object.dacl = acl)
100
+ end
101
+
102
+ def with_temp_script_file
103
+ Tempfile.open(["chef-script", script_extension]) do |script_file|
104
+ script_file.puts(code)
105
+ script_file.close
106
+
107
+ grant_alternate_user_read_access(script_file.path)
108
+
109
+ # This needs to be set here so that the call to #command in Execute works.
110
+ self.script_file_path = script_file.path
111
+
112
+ yield
113
+
114
+ self.script_file_path = nil
115
+ end
116
+ end
117
+
118
+ def input
119
+ nil
120
+ end
121
+
122
+ public
123
+
124
+ action :run do
125
+ with_wow64_redirection_disabled do
126
+ with_temp_script_file do
127
+ super()
128
+ end
129
+ end
130
+ end
70
131
 
71
- @script_file ||= Tempfile.open(temp_file_arguments)
132
+ def script_extension
133
+ raise Chef::Exceptions::Override, "You must override #{__method__} in #{self}"
72
134
  end
73
135
  end
74
136
  end