chef 16.1.16 → 16.2.44
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/Gemfile +2 -3
- data/README.md +3 -3
- data/Rakefile +2 -2
- data/chef.gemspec +3 -3
- data/lib/chef/application/apply.rb +1 -1
- data/lib/chef/application/base.rb +1 -1
- data/lib/chef/application/client.rb +1 -1
- data/lib/chef/application/windows_service_manager.rb +1 -1
- data/lib/chef/chef_fs/data_handler/data_bag_item_data_handler.rb +1 -1
- data/lib/chef/chef_fs/path_utils.rb +1 -1
- data/lib/chef/cookbook/chefignore.rb +1 -1
- data/lib/chef/cookbook/metadata.rb +1 -1
- data/lib/chef/cookbook_version.rb +2 -2
- data/lib/chef/data_bag.rb +4 -4
- data/lib/chef/deprecated.rb +4 -0
- data/lib/chef/file_access_control.rb +1 -1
- data/lib/chef/formatters/error_inspectors/compile_error_inspector.rb +1 -1
- data/lib/chef/formatters/error_inspectors/resource_failure_inspector.rb +3 -3
- data/lib/chef/http.rb +17 -2
- data/lib/chef/http/http_request.rb +1 -1
- data/lib/chef/http/json_output.rb +1 -1
- data/lib/chef/http/ssl_policies.rb +18 -0
- data/lib/chef/knife.rb +1 -1
- data/lib/chef/knife/bootstrap.rb +3 -6
- data/lib/chef/knife/bootstrap/templates/chef-full.erb +9 -9
- data/lib/chef/knife/client_bulk_delete.rb +1 -1
- data/lib/chef/knife/config_get.rb +1 -1
- data/lib/chef/knife/cookbook_delete.rb +1 -1
- data/lib/chef/knife/core/cookbook_scm_repo.rb +1 -1
- data/lib/chef/knife/data_bag_create.rb +1 -1
- data/lib/chef/knife/node_bulk_delete.rb +1 -1
- data/lib/chef/knife/node_run_list_remove.rb +1 -1
- data/lib/chef/knife/role_bulk_delete.rb +1 -1
- data/lib/chef/knife/ssh.rb +1 -1
- data/lib/chef/knife/supermarket_share.rb +1 -1
- data/lib/chef/knife/supermarket_unshare.rb +1 -1
- data/lib/chef/log.rb +1 -1
- data/lib/chef/mixin/securable.rb +2 -2
- data/lib/chef/powershell.rb +1 -1
- data/lib/chef/provider/batch.rb +3 -10
- data/lib/chef/provider/cron.rb +2 -14
- data/lib/chef/provider/execute.rb +2 -1
- data/lib/chef/provider/group/dscl.rb +2 -2
- data/lib/chef/provider/group/windows.rb +1 -1
- data/lib/chef/provider/ifconfig.rb +7 -7
- data/lib/chef/provider/mount/aix.rb +1 -1
- data/lib/chef/provider/mount/windows.rb +2 -2
- data/lib/chef/provider/noop.rb +1 -1
- data/lib/chef/provider/package/openbsd.rb +1 -1
- data/lib/chef/provider/package/portage.rb +2 -2
- data/lib/chef/provider/package/powershell.rb +6 -2
- data/lib/chef/provider/package/rubygems.rb +2 -2
- data/lib/chef/provider/package/snap.rb +96 -27
- data/lib/chef/provider/package/windows/msi.rb +3 -3
- data/lib/chef/provider/package/windows/registry_uninstall_entry.rb +1 -1
- data/lib/chef/provider/powershell_script.rb +10 -14
- data/lib/chef/provider/remote_file/http.rb +4 -1
- data/lib/chef/provider/script.rb +4 -75
- data/lib/chef/provider/service/arch.rb +1 -1
- data/lib/chef/provider/service/debian.rb +2 -2
- data/lib/chef/provider/service/openbsd.rb +4 -4
- data/lib/chef/provider/service/redhat.rb +1 -1
- data/lib/chef/provider/service/windows.rb +1 -1
- data/lib/chef/provider/subversion.rb +2 -2
- data/lib/chef/provider/user/dscl.rb +4 -4
- data/lib/chef/provider/user/linux.rb +3 -3
- data/lib/chef/provider/user/mac.rb +5 -5
- data/lib/chef/provider/windows_script.rb +87 -25
- data/lib/chef/provider/zypper_repository.rb +30 -10
- data/lib/chef/resource.rb +22 -11
- data/lib/chef/resource/apt_package.rb +1 -1
- data/lib/chef/resource/archive_file.rb +28 -8
- data/lib/chef/resource/bash.rb +0 -1
- data/lib/chef/resource/batch.rb +4 -2
- data/lib/chef/resource/chef_client_scheduled_task.rb +13 -1
- data/lib/chef/resource/cron/_cron_shared.rb +98 -0
- data/lib/chef/resource/cron/cron.rb +46 -0
- data/lib/chef/resource/{cron_d.rb → cron/cron_d.rb} +7 -87
- data/lib/chef/resource/cron_access.rb +11 -3
- data/lib/chef/resource/csh.rb +0 -1
- data/lib/chef/resource/execute.rb +477 -7
- data/lib/chef/resource/file.rb +1 -1
- data/lib/chef/resource/freebsd_package.rb +1 -1
- data/lib/chef/resource/helpers/cron_validations.rb +6 -3
- data/lib/chef/resource/homebrew_package.rb +30 -1
- data/lib/chef/resource/homebrew_update.rb +107 -0
- data/lib/chef/resource/hostname.rb +6 -19
- data/lib/chef/resource/kernel_module.rb +14 -1
- data/lib/chef/resource/mount.rb +1 -1
- data/lib/chef/resource/perl.rb +0 -1
- data/lib/chef/resource/plist.rb +23 -4
- data/lib/chef/resource/powershell_script.rb +4 -2
- data/lib/chef/resource/python.rb +0 -1
- data/lib/chef/resource/remote_file.rb +26 -10
- data/lib/chef/resource/ruby.rb +0 -1
- data/lib/chef/resource/template.rb +1 -1
- data/lib/chef/resource/windows_ad_join.rb +30 -1
- data/lib/chef/resource/windows_audit_policy.rb +227 -0
- data/lib/chef/resource/windows_auto_run.rb +11 -0
- data/lib/chef/resource/windows_certificate.rb +26 -0
- data/lib/chef/resource/windows_font.rb +3 -3
- data/lib/chef/resource/windows_package.rb +1 -1
- data/lib/chef/resource/windows_pagefile.rb +1 -1
- data/lib/chef/resource/windows_script.rb +2 -16
- data/lib/chef/resource/windows_security_policy.rb +17 -15
- data/lib/chef/resource/windows_shortcut.rb +1 -2
- data/lib/chef/resource/windows_task.rb +4 -4
- data/lib/chef/resource/windows_user_privilege.rb +5 -5
- data/lib/chef/resource/yum_repository.rb +9 -9
- data/lib/chef/resources.rb +4 -2
- data/lib/chef/search/query.rb +1 -1
- data/lib/chef/util/diff.rb +2 -2
- data/lib/chef/util/windows/net_user.rb +1 -1
- data/lib/chef/util/windows/volume.rb +1 -1
- data/lib/chef/version.rb +1 -1
- data/lib/chef/win32/file.rb +1 -1
- data/lib/chef/win32/registry.rb +2 -2
- data/lib/chef/win32/security.rb +1 -1
- data/spec/data/lwrp/providers/buck_passer.rb +1 -1
- data/spec/data/lwrp/providers/buck_passer_2.rb +1 -1
- data/spec/data/lwrp/providers/embedded_resource_accesses_providers_scope.rb +1 -1
- data/spec/functional/resource/cron_spec.rb +10 -0
- data/spec/functional/resource/remote_file_spec.rb +2 -2
- data/spec/functional/resource/windows_task_spec.rb +8 -8
- data/spec/support/platform_helpers.rb +1 -1
- data/spec/support/platforms/win32/spec_service.rb +1 -1
- data/spec/support/shared/functional/execute_resource.rb +1 -1
- data/spec/support/shared/unit/execute_resource.rb +1 -1
- data/spec/unit/application_spec.rb +7 -0
- data/spec/unit/data_bag_spec.rb +1 -1
- data/spec/unit/http/ssl_policies_spec.rb +20 -0
- data/spec/unit/knife/bootstrap_spec.rb +2 -2
- data/spec/unit/mixin/user_context_spec.rb +1 -9
- data/spec/unit/property_spec.rb +1 -1
- data/spec/unit/provider/batch_spec.rb +130 -0
- data/spec/unit/provider/cron_spec.rb +9 -49
- data/spec/unit/provider/package/powershell_spec.rb +95 -86
- data/spec/unit/provider/package/snap_spec.rb +1 -1
- data/spec/unit/provider/powershell_script_spec.rb +3 -45
- data/spec/unit/provider/script_spec.rb +20 -110
- data/spec/unit/provider/zypper_repository_spec.rb +60 -10
- data/spec/unit/resource/archive_file_spec.rb +11 -2
- data/spec/unit/resource/chef_client_scheduled_task_spec.rb +17 -7
- data/spec/unit/resource/cron_spec.rb +2 -2
- data/spec/unit/resource/helpers/cron_validations_spec.rb +5 -1
- data/spec/unit/resource/homebrew_update_spec.rb +30 -0
- data/spec/unit/resource/powershell_script_spec.rb +10 -15
- data/spec/unit/resource/timezone_spec.rb +1 -1
- data/spec/unit/resource/windows_audit_policy_spec.rb +64 -0
- data/spec/unit/resource/windows_dns_record_spec.rb +3 -3
- data/spec/unit/resource/windows_dns_zone_spec.rb +2 -2
- data/spec/unit/resource/windows_task_spec.rb +1 -1
- data/spec/unit/resource/windows_uac_spec.rb +2 -2
- data/spec/unit/resource/yum_repository_spec.rb +21 -21
- data/spec/unit/resource_spec.rb +67 -1
- data/spec/unit/util/dsc/configuration_generator_spec.rb +1 -1
- data/spec/unit/util/threaded_job_queue_spec.rb +9 -0
- metadata +22 -22
- data/lib/chef/resource/cron.rb +0 -157
@@ -28,7 +28,7 @@ class Chef
|
|
28
28
|
provides(:cron_manage) # legacy name @todo in Chef 15 we should { true } this so it wins over the cookbook
|
29
29
|
|
30
30
|
introduced "14.4"
|
31
|
-
description "Use the **cron_access** resource to manage
|
31
|
+
description "Use the **cron_access** resource to manage cron's cron.allow and cron.deny files. Note: This resource previously shipped in the `cron` cookbook as `cron_manage`, which it can still be used as for backwards compatibility with existing Chef Infra Client releases."
|
32
32
|
examples <<~DOC
|
33
33
|
**Add the mike user to cron.allow**
|
34
34
|
|
@@ -58,11 +58,18 @@ class Chef
|
|
58
58
|
description: "An optional property to set the user name if it differs from the resource block's name.",
|
59
59
|
name_property: true
|
60
60
|
|
61
|
+
CRON_PATHS = {
|
62
|
+
"aix" => "/var/adm/cron",
|
63
|
+
"solaris" => "/etc/cron.d",
|
64
|
+
"default" => "/etc",
|
65
|
+
}.freeze
|
66
|
+
|
61
67
|
action :allow do
|
62
68
|
description "Add the user to the cron.allow file."
|
69
|
+
allow_path = ::File.join(value_for_platform_family(CRON_PATHS), "cron.allow")
|
63
70
|
|
64
71
|
with_run_context :root do
|
65
|
-
edit_resource(:template,
|
72
|
+
edit_resource(:template, allow_path) do |new_resource|
|
66
73
|
source ::File.expand_path("../support/cron_access.erb", __FILE__)
|
67
74
|
local true
|
68
75
|
mode "0600"
|
@@ -76,9 +83,10 @@ class Chef
|
|
76
83
|
|
77
84
|
action :deny do
|
78
85
|
description "Add the user to the cron.deny file."
|
86
|
+
deny_path = ::File.join(value_for_platform_family(CRON_PATHS), "cron.deny")
|
79
87
|
|
80
88
|
with_run_context :root do
|
81
|
-
edit_resource(:template,
|
89
|
+
edit_resource(:template, deny_path) do |new_resource|
|
82
90
|
source ::File.expand_path("../support/cron_access.erb", __FILE__)
|
83
91
|
local true
|
84
92
|
mode "0600"
|
data/lib/chef/resource/csh.rb
CHANGED
@@ -27,10 +27,476 @@ class Chef
|
|
27
27
|
|
28
28
|
provides :execute, target_mode: true
|
29
29
|
|
30
|
-
description "Use the **execute** resource to execute a single command. Commands that"
|
31
|
-
|
32
|
-
|
33
|
-
|
30
|
+
description "Use the **execute** resource to execute a single command. Commands that are executed with this resource are (by their nature) not idempotent, as they are typically unique to the environment in which they are run. Use not_if and only_if to guard this resource for idempotence. Note: Use the **script** resource to execute a script using a specific interpreter (Ruby, Python, Perl, csh, or Bash)."
|
31
|
+
|
32
|
+
examples <<~EXAMPLES
|
33
|
+
**Run a command upon notification**:
|
34
|
+
|
35
|
+
```ruby
|
36
|
+
execute 'slapadd' do
|
37
|
+
command 'slapadd < /tmp/something.ldif'
|
38
|
+
creates '/var/lib/slapd/uid.bdb'
|
39
|
+
|
40
|
+
action :nothing
|
41
|
+
end
|
42
|
+
|
43
|
+
template '/tmp/something.ldif' do
|
44
|
+
source 'something.ldif'
|
45
|
+
|
46
|
+
notifies :run, 'execute[slapadd]', :immediately
|
47
|
+
end
|
48
|
+
```
|
49
|
+
|
50
|
+
**Run a touch file only once while running a command**:
|
51
|
+
|
52
|
+
```ruby
|
53
|
+
execute 'upgrade script' do
|
54
|
+
command 'php upgrade-application.php && touch /var/application/.upgraded'
|
55
|
+
|
56
|
+
creates '/var/application/.upgraded'
|
57
|
+
action :run
|
58
|
+
end
|
59
|
+
```
|
60
|
+
|
61
|
+
**Run a command which requires an environment variable**:
|
62
|
+
|
63
|
+
```ruby
|
64
|
+
execute 'slapadd' do
|
65
|
+
command 'slapadd < /tmp/something.ldif'
|
66
|
+
creates '/var/lib/slapd/uid.bdb'
|
67
|
+
|
68
|
+
action :run
|
69
|
+
environment ({'HOME' => '/home/my_home'})
|
70
|
+
end
|
71
|
+
```
|
72
|
+
|
73
|
+
**Delete a repository using yum to scrub the cache**:
|
74
|
+
|
75
|
+
```ruby
|
76
|
+
# the following code sample thanks to gaffneyc @ https://gist.github.com/918711
|
77
|
+
execute 'clean-yum-cache' do
|
78
|
+
command 'yum clean all'
|
79
|
+
action :nothing
|
80
|
+
end
|
81
|
+
|
82
|
+
file '/etc/yum.repos.d/bad.repo' do
|
83
|
+
action :delete
|
84
|
+
notifies :run, 'execute[clean-yum-cache]', :immediately
|
85
|
+
end
|
86
|
+
```
|
87
|
+
|
88
|
+
**Prevent restart and reconfigure if configuration is broken**:
|
89
|
+
|
90
|
+
Use the `:nothing` action (common to all resources) to prevent the test from
|
91
|
+
starting automatically, and then use the `subscribes` notification to run a
|
92
|
+
configuration test when a change to the template is detected.
|
93
|
+
|
94
|
+
```ruby
|
95
|
+
execute 'test-nagios-config' do
|
96
|
+
command 'nagios3 --verify-config'
|
97
|
+
action :nothing
|
98
|
+
subscribes :run, 'template[/etc/nagios3/configures-nagios.conf]', :immediately
|
99
|
+
end
|
100
|
+
```
|
101
|
+
|
102
|
+
**Notify in a specific order**:
|
103
|
+
|
104
|
+
To notify multiple resources, and then have these resources run in a certain
|
105
|
+
order, do something like the following.
|
106
|
+
|
107
|
+
```ruby
|
108
|
+
execute 'foo' do
|
109
|
+
command '...'
|
110
|
+
notifies :create, 'template[baz]', :immediately
|
111
|
+
notifies :install, 'package[bar]', :immediately
|
112
|
+
notifies :run, 'execute[final]', :immediately
|
113
|
+
end
|
114
|
+
|
115
|
+
template 'baz' do
|
116
|
+
#...
|
117
|
+
notifies :run, 'execute[restart_baz]', :immediately
|
118
|
+
end
|
119
|
+
|
120
|
+
package 'bar'
|
121
|
+
execute 'restart_baz'
|
122
|
+
execute 'final' do
|
123
|
+
command '...'
|
124
|
+
end
|
125
|
+
```
|
126
|
+
|
127
|
+
where the sequencing will be in the same order as the resources are listed in
|
128
|
+
the recipe: `execute 'foo'`, `template 'baz'`, `execute [restart_baz]`,
|
129
|
+
`package 'bar'`, and `execute 'final'`.
|
130
|
+
|
131
|
+
**Execute a command using a template**:
|
132
|
+
|
133
|
+
The following example shows how to set up IPv4 packet forwarding using the
|
134
|
+
**execute** resource to run a command named `forward_ipv4` that uses a template
|
135
|
+
defined by the **template** resource.
|
136
|
+
|
137
|
+
```ruby
|
138
|
+
execute 'forward_ipv4' do
|
139
|
+
command 'echo > /proc/.../ipv4/ip_forward'
|
140
|
+
action :nothing
|
141
|
+
end
|
142
|
+
|
143
|
+
template '/etc/file_name.conf' do
|
144
|
+
source 'routing/file_name.conf.erb'
|
145
|
+
|
146
|
+
notifies :run, 'execute[forward_ipv4]', :delayed
|
147
|
+
end
|
148
|
+
```
|
149
|
+
|
150
|
+
where the `command` property for the **execute** resource contains the command
|
151
|
+
that is to be run and the `source` property for the **template** resource
|
152
|
+
specifies which template to use. The `notifies` property for the **template**
|
153
|
+
specifies that the `execute[forward_ipv4]` (which is defined by the **execute**
|
154
|
+
resource) should be queued up and run at the end of a Chef Infra Client run.
|
155
|
+
|
156
|
+
**Add a rule to an IP table**:
|
157
|
+
|
158
|
+
The following example shows how to add a rule named `test_rule` to an IP table
|
159
|
+
using the **execute** resource to run a command using a template that is defined
|
160
|
+
by the **template** resource:
|
161
|
+
|
162
|
+
```ruby
|
163
|
+
execute 'test_rule' do
|
164
|
+
command 'command_to_run
|
165
|
+
--option value
|
166
|
+
--option value
|
167
|
+
--source \#{node[:name_of_node][:ipsec][:local][:subnet]}
|
168
|
+
-j test_rule'
|
169
|
+
|
170
|
+
action :nothing
|
171
|
+
end
|
172
|
+
|
173
|
+
template '/etc/file_name.local' do
|
174
|
+
source 'routing/file_name.local.erb'
|
175
|
+
notifies :run, 'execute[test_rule]', :delayed
|
176
|
+
end
|
177
|
+
```
|
178
|
+
|
179
|
+
where the `command` property for the **execute** resource contains the command
|
180
|
+
that is to be run and the `source` property for the **template** resource
|
181
|
+
specifies which template to use. The `notifies` property for the **template**
|
182
|
+
specifies that the `execute[test_rule]` (which is defined by the **execute**
|
183
|
+
resource) should be queued up and run at the end of a Chef Infra Client run.
|
184
|
+
|
185
|
+
**Stop a service, do stuff, and then restart it**:
|
186
|
+
|
187
|
+
The following example shows how to use the **execute**, **service**, and
|
188
|
+
**mount** resources together to ensure that a node running on Amazon EC2 is
|
189
|
+
running MySQL. This example does the following:
|
190
|
+
|
191
|
+
- Checks to see if the Amazon EC2 node has MySQL
|
192
|
+
- If the node has MySQL, stops MySQL
|
193
|
+
- Installs MySQL
|
194
|
+
- Mounts the node
|
195
|
+
- Restarts MySQL
|
196
|
+
|
197
|
+
```ruby
|
198
|
+
# the following code sample comes from the ``server_ec2``
|
199
|
+
# recipe in the following cookbook:
|
200
|
+
# https://github.com/chef-cookbooks/mysql
|
201
|
+
|
202
|
+
if (node.attribute?('ec2') && !FileTest.directory?(node['mysql']['ec2_path']))
|
203
|
+
service 'mysql' do
|
204
|
+
action :stop
|
205
|
+
end
|
206
|
+
|
207
|
+
execute 'install-mysql' do
|
208
|
+
command "mv \#{node['mysql']['data_dir']} \#{node['mysql']['ec2_path']}"
|
209
|
+
not_if { ::File.directory?(node['mysql']['ec2_path']) }
|
210
|
+
end
|
211
|
+
|
212
|
+
[node['mysql']['ec2_path'], node['mysql']['data_dir']].each do |dir|
|
213
|
+
directory dir do
|
214
|
+
owner 'mysql'
|
215
|
+
group 'mysql'
|
216
|
+
end
|
217
|
+
end
|
218
|
+
|
219
|
+
mount node['mysql']['data_dir'] do
|
220
|
+
device node['mysql']['ec2_path']
|
221
|
+
fstype 'none'
|
222
|
+
options 'bind,rw'
|
223
|
+
action [:mount, :enable]
|
224
|
+
end
|
225
|
+
|
226
|
+
service 'mysql' do
|
227
|
+
action :start
|
228
|
+
end
|
229
|
+
end
|
230
|
+
```
|
231
|
+
|
232
|
+
where
|
233
|
+
|
234
|
+
- the two **service** resources are used to stop, and then restart the MySQL service
|
235
|
+
- the **execute** resource is used to install MySQL
|
236
|
+
- the **mount** resource is used to mount the node and enable MySQL
|
237
|
+
|
238
|
+
**Use the platform_family? method**:
|
239
|
+
|
240
|
+
The following is an example of using the `platform_family?` method in the Recipe
|
241
|
+
DSL to create a variable that can be used with other resources in the same
|
242
|
+
recipe. In this example, `platform_family?` is being used to ensure that a
|
243
|
+
specific binary is used for a specific platform before using the **remote_file**
|
244
|
+
resource to download a file from a remote location, and then using the
|
245
|
+
**execute** resource to install that file by running a command.
|
246
|
+
|
247
|
+
```ruby
|
248
|
+
if platform_family?('rhel')
|
249
|
+
pip_binary = '/usr/bin/pip'
|
250
|
+
else
|
251
|
+
pip_binary = '/usr/local/bin/pip'
|
252
|
+
end
|
253
|
+
|
254
|
+
remote_file "\#{Chef::Config[:file_cache_path]}/distribute_setup.py" do
|
255
|
+
source 'http://python-distribute.org/distribute_setup.py'
|
256
|
+
mode '0755'
|
257
|
+
not_if { ::File.exist?(pip_binary) }
|
258
|
+
end
|
259
|
+
|
260
|
+
execute 'install-pip' do
|
261
|
+
cwd Chef::Config[:file_cache_path]
|
262
|
+
command <<~EOF
|
263
|
+
# command for installing Python goes here
|
264
|
+
EOF
|
265
|
+
not_if { ::File.exist?(pip_binary) }
|
266
|
+
end
|
267
|
+
```
|
268
|
+
|
269
|
+
where a command for installing Python might look something like:
|
270
|
+
|
271
|
+
```ruby
|
272
|
+
\#{node['python']['binary']} distribute_setup.py \#{::File.dirname(pip_binary)}/easy_install pip
|
273
|
+
```
|
274
|
+
|
275
|
+
**Control a service using the execute resource**:
|
276
|
+
|
277
|
+
<div class="admonition-warning">
|
278
|
+
<p class="admonition-warning-title">Warning</p>
|
279
|
+
<div class="admonition-warning-text">
|
280
|
+
This is an example of something that should NOT be done. Use the **service**
|
281
|
+
resource to control a service, not the **execute** resource.
|
282
|
+
</div>
|
283
|
+
</div>
|
284
|
+
|
285
|
+
Do something like this:
|
286
|
+
|
287
|
+
```ruby
|
288
|
+
service 'tomcat' do
|
289
|
+
action :start
|
290
|
+
end
|
291
|
+
```
|
292
|
+
|
293
|
+
and NOT something like this:
|
294
|
+
|
295
|
+
```ruby
|
296
|
+
execute 'start-tomcat' do
|
297
|
+
command '/etc/init.d/tomcat start'
|
298
|
+
action :run
|
299
|
+
end
|
300
|
+
```
|
301
|
+
|
302
|
+
There is no reason to use the **execute** resource to control a service because
|
303
|
+
the **service** resource exposes the `start_command` property directly, which
|
304
|
+
gives a recipe full control over the command issued in a much cleaner, more
|
305
|
+
direct manner.
|
306
|
+
|
307
|
+
**Use the search recipe DSL method to find users**:
|
308
|
+
|
309
|
+
The following example shows how to use the `search` method in the Recipe DSL to
|
310
|
+
search for users:
|
311
|
+
|
312
|
+
```ruby
|
313
|
+
# the following code sample comes from the openvpn cookbook:
|
314
|
+
|
315
|
+
search("users", "*:*") do |u|
|
316
|
+
execute "generate-openvpn-\#{u['id']}" do
|
317
|
+
command "./pkitool \#{u['id']}"
|
318
|
+
cwd '/etc/openvpn/easy-rsa'
|
319
|
+
end
|
320
|
+
|
321
|
+
%w{ conf ovpn }.each do |ext|
|
322
|
+
template "\#{node['openvpn']['key_dir']}/\#{u['id']}.\#{ext}" do
|
323
|
+
source 'client.conf.erb'
|
324
|
+
variables :username => u['id']
|
325
|
+
end
|
326
|
+
end
|
327
|
+
end
|
328
|
+
```
|
329
|
+
|
330
|
+
where
|
331
|
+
|
332
|
+
- the search data will be used to create **execute** resources
|
333
|
+
- the **template** resource tells Chef Infra Client which template to use
|
334
|
+
|
335
|
+
**Enable remote login for macOS**:
|
336
|
+
|
337
|
+
```ruby
|
338
|
+
execute 'enable ssh' do
|
339
|
+
command '/usr/sbin/systemsetup -setremotelogin on'
|
340
|
+
not_if '/usr/sbin/systemsetup -getremotelogin | /usr/bin/grep On'
|
341
|
+
action :run
|
342
|
+
end
|
343
|
+
```
|
344
|
+
|
345
|
+
**Execute code immediately, based on the template resource**:
|
346
|
+
|
347
|
+
By default, notifications are `:delayed`, that is they are queued up as they are
|
348
|
+
triggered, and then executed at the very end of a Chef Infra Client run. To run
|
349
|
+
kan action immediately, use `:immediately`:
|
350
|
+
|
351
|
+
```ruby
|
352
|
+
template '/etc/nagios3/configures-nagios.conf' do
|
353
|
+
# other parameters
|
354
|
+
notifies :run, 'execute[test-nagios-config]', :immediately
|
355
|
+
end
|
356
|
+
```
|
357
|
+
|
358
|
+
and then Chef Infra Client would immediately run the following:
|
359
|
+
|
360
|
+
```ruby
|
361
|
+
execute 'test-nagios-config' do
|
362
|
+
command 'nagios3 --verify-config'
|
363
|
+
action :nothing
|
364
|
+
end
|
365
|
+
```
|
366
|
+
|
367
|
+
**Sourcing a file**:
|
368
|
+
|
369
|
+
The **execute** resource cannot be used to source a file (e.g. `command 'source
|
370
|
+
filename'`). The following example will fail because `source` is not an
|
371
|
+
executable:
|
372
|
+
|
373
|
+
```ruby
|
374
|
+
execute 'foo' do
|
375
|
+
command 'source /tmp/foo.sh'
|
376
|
+
end
|
377
|
+
```
|
378
|
+
|
379
|
+
|
380
|
+
Instead, use the **script** resource or one of the **script**-based resources
|
381
|
+
(**bash**, **csh**, **perl**, **python**, or **ruby**). For example:
|
382
|
+
|
383
|
+
```ruby
|
384
|
+
bash 'foo' do
|
385
|
+
code 'source /tmp/foo.sh'
|
386
|
+
end
|
387
|
+
```
|
388
|
+
|
389
|
+
**Run a Knife command**:
|
390
|
+
|
391
|
+
```ruby
|
392
|
+
execute 'create_user' do
|
393
|
+
command <<~EOM
|
394
|
+
knife user create \#{user}
|
395
|
+
--admin
|
396
|
+
--password password
|
397
|
+
--disable-editing
|
398
|
+
--file /home/vagrant/.chef/user.pem
|
399
|
+
--config /tmp/knife-admin.rb
|
400
|
+
EOM
|
401
|
+
end
|
402
|
+
```
|
403
|
+
|
404
|
+
**Run install command into virtual environment**:
|
405
|
+
|
406
|
+
The following example shows how to install a lightweight JavaScript framework
|
407
|
+
into Vagrant:
|
408
|
+
|
409
|
+
```ruby
|
410
|
+
execute "install q and zombiejs" do
|
411
|
+
cwd "/home/vagrant"
|
412
|
+
user "vagrant"
|
413
|
+
environment ({'HOME' => '/home/vagrant', 'USER' => 'vagrant'})
|
414
|
+
command "npm install -g q zombie should mocha coffee-script"
|
415
|
+
action :run
|
416
|
+
end
|
417
|
+
```
|
418
|
+
|
419
|
+
**Run a command as a named user**:
|
420
|
+
|
421
|
+
The following example shows how to run `bundle install` from a Chef Infra Client
|
422
|
+
run as a specific user. This will put the gem into the path of the user
|
423
|
+
(`vagrant`) instead of the root user (under which the Chef Infra Client runs):
|
424
|
+
|
425
|
+
```ruby
|
426
|
+
execute '/opt/chefdk/embedded/bin/bundle install' do
|
427
|
+
cwd node['chef_workstation']['bundler_path']
|
428
|
+
user node['chef_workstation']['user']
|
429
|
+
|
430
|
+
environment ({
|
431
|
+
'HOME' => "/home/\#{node['chef_workstation']['user']}",
|
432
|
+
'USER' => node['chef_workstation']['user']
|
433
|
+
})
|
434
|
+
not_if 'bundle check'
|
435
|
+
end
|
436
|
+
```
|
437
|
+
|
438
|
+
**Run a command as an alternate user**:
|
439
|
+
|
440
|
+
*Note*: When Chef is running as a service, this feature requires that the user
|
441
|
+
that Chef runs as has 'SeAssignPrimaryTokenPrivilege' (aka
|
442
|
+
'SE_ASSIGNPRIMARYTOKEN_NAME') user right. By default only LocalSystem and
|
443
|
+
NetworkService have this right when running as a service. This is necessary
|
444
|
+
even if the user is an Administrator.
|
445
|
+
|
446
|
+
This right can be added and checked in a recipe using this example:
|
447
|
+
|
448
|
+
```ruby
|
449
|
+
# Add 'SeAssignPrimaryTokenPrivilege' for the user
|
450
|
+
Chef::ReservedNames::Win32::Security.add_account_right('<user>', 'SeAssignPrimaryTokenPrivilege')
|
451
|
+
|
452
|
+
# Check if the user has 'SeAssignPrimaryTokenPrivilege' rights
|
453
|
+
Chef::ReservedNames::Win32::Security.get_account_right('<user>').include?('SeAssignPrimaryTokenPrivilege')
|
454
|
+
```
|
455
|
+
|
456
|
+
The following example shows how to run `mkdir test_dir` from a Chef Infra Client
|
457
|
+
run as an alternate user.
|
458
|
+
|
459
|
+
```ruby
|
460
|
+
# Passing only username and password
|
461
|
+
execute 'mkdir test_dir' do
|
462
|
+
cwd Chef::Config[:file_cache_path]
|
463
|
+
|
464
|
+
user "username"
|
465
|
+
password "password"
|
466
|
+
end
|
467
|
+
|
468
|
+
# Passing username and domain
|
469
|
+
execute 'mkdir test_dir' do
|
470
|
+
cwd Chef::Config[:file_cache_path]
|
471
|
+
|
472
|
+
domain "domain-name"
|
473
|
+
user "user"
|
474
|
+
password "password"
|
475
|
+
end
|
476
|
+
|
477
|
+
# Passing username = 'domain-name\\username'. No domain is passed
|
478
|
+
execute 'mkdir test_dir' do
|
479
|
+
cwd Chef::Config[:file_cache_path]
|
480
|
+
|
481
|
+
user "domain-name\\username"
|
482
|
+
password "password"
|
483
|
+
end
|
484
|
+
|
485
|
+
# Passing username = 'username@domain-name'. No domain is passed
|
486
|
+
execute 'mkdir test_dir' do
|
487
|
+
cwd Chef::Config[:file_cache_path]
|
488
|
+
|
489
|
+
user "username@domain-name"
|
490
|
+
password "password"
|
491
|
+
end
|
492
|
+
```
|
493
|
+
|
494
|
+
**Run a command with an external input file**:
|
495
|
+
|
496
|
+
execute 'md5sum' do
|
497
|
+
input File.read(__FILE__)
|
498
|
+
end
|
499
|
+
EXAMPLES
|
34
500
|
|
35
501
|
# The ResourceGuardInterpreter wraps a resource's guards in another resource. That inner resource
|
36
502
|
# needs to behave differently during (for example) why_run mode, so we flag it here. For why_run mode
|
@@ -62,13 +528,13 @@ class Chef
|
|
62
528
|
description: "The current working directory from which the command will be run."
|
63
529
|
|
64
530
|
property :environment, Hash,
|
65
|
-
description: "A Hash of environment variables in the form of ({'ENV_VARIABLE' => 'VALUE'})."
|
531
|
+
description: "A Hash of environment variables in the form of `({'ENV_VARIABLE' => 'VALUE'})`. **Note**: These variables must exist for a command to be run successfully."
|
66
532
|
|
67
533
|
property :group, [ String, Integer ],
|
68
534
|
description: "The group name or group ID that must be changed before running a command."
|
69
535
|
|
70
536
|
property :live_stream, [ TrueClass, FalseClass ], default: false,
|
71
|
-
description: "Send the output of the command run by this execute resource block to the #{Chef::Dist::
|
537
|
+
description: "Send the output of the command run by this execute resource block to the #{Chef::Dist::PRODUCT} event stream."
|
72
538
|
|
73
539
|
# default_env defaults to `false` so that the command execution more exactly matches what the user gets on the command line without magic
|
74
540
|
property :default_env, [ TrueClass, FalseClass ], desired_state: false, default: false,
|
@@ -96,13 +562,17 @@ class Chef
|
|
96
562
|
|
97
563
|
# lazy used to set default value of sensitive to true if password is set
|
98
564
|
property :sensitive, [ TrueClass, FalseClass ],
|
99
|
-
description: "Ensure that sensitive resource data is not logged by the #{Chef::Dist::
|
565
|
+
description: "Ensure that sensitive resource data is not logged by the #{Chef::Dist::PRODUCT}.",
|
100
566
|
default: lazy { password ? true : false }, default_description: "True if the password property is set. False otherwise."
|
101
567
|
|
102
568
|
property :elevated, [ TrueClass, FalseClass ], default: false,
|
103
569
|
description: "Determines whether the script will run with elevated permissions to circumvent User Access Control (UAC) interactively blocking the process.\nThis will cause the process to be run under a batch login instead of an interactive login. The user running #{Chef::Dist::CLIENT} needs the 'Replace a process level token' and 'Adjust Memory Quotas for a process' permissions. The user that is running the command needs the 'Log on as a batch job' permission.\nBecause this requires a login, the user and password properties are required.",
|
104
570
|
introduced: "13.3"
|
105
571
|
|
572
|
+
property :input, [String],
|
573
|
+
introduced: "16.2",
|
574
|
+
description: "An optional property to set the input sent to the command as STDIN."
|
575
|
+
|
106
576
|
alias :env :environment
|
107
577
|
|
108
578
|
def self.set_guard_inherited_attributes(*inherited_attributes)
|