chef 16.1.16 → 16.2.44

Sign up to get free protection for your applications and to get access to all the features.
Files changed (160) hide show
  1. checksums.yaml +4 -4
  2. data/Gemfile +2 -3
  3. data/README.md +3 -3
  4. data/Rakefile +2 -2
  5. data/chef.gemspec +3 -3
  6. data/lib/chef/application/apply.rb +1 -1
  7. data/lib/chef/application/base.rb +1 -1
  8. data/lib/chef/application/client.rb +1 -1
  9. data/lib/chef/application/windows_service_manager.rb +1 -1
  10. data/lib/chef/chef_fs/data_handler/data_bag_item_data_handler.rb +1 -1
  11. data/lib/chef/chef_fs/path_utils.rb +1 -1
  12. data/lib/chef/cookbook/chefignore.rb +1 -1
  13. data/lib/chef/cookbook/metadata.rb +1 -1
  14. data/lib/chef/cookbook_version.rb +2 -2
  15. data/lib/chef/data_bag.rb +4 -4
  16. data/lib/chef/deprecated.rb +4 -0
  17. data/lib/chef/file_access_control.rb +1 -1
  18. data/lib/chef/formatters/error_inspectors/compile_error_inspector.rb +1 -1
  19. data/lib/chef/formatters/error_inspectors/resource_failure_inspector.rb +3 -3
  20. data/lib/chef/http.rb +17 -2
  21. data/lib/chef/http/http_request.rb +1 -1
  22. data/lib/chef/http/json_output.rb +1 -1
  23. data/lib/chef/http/ssl_policies.rb +18 -0
  24. data/lib/chef/knife.rb +1 -1
  25. data/lib/chef/knife/bootstrap.rb +3 -6
  26. data/lib/chef/knife/bootstrap/templates/chef-full.erb +9 -9
  27. data/lib/chef/knife/client_bulk_delete.rb +1 -1
  28. data/lib/chef/knife/config_get.rb +1 -1
  29. data/lib/chef/knife/cookbook_delete.rb +1 -1
  30. data/lib/chef/knife/core/cookbook_scm_repo.rb +1 -1
  31. data/lib/chef/knife/data_bag_create.rb +1 -1
  32. data/lib/chef/knife/node_bulk_delete.rb +1 -1
  33. data/lib/chef/knife/node_run_list_remove.rb +1 -1
  34. data/lib/chef/knife/role_bulk_delete.rb +1 -1
  35. data/lib/chef/knife/ssh.rb +1 -1
  36. data/lib/chef/knife/supermarket_share.rb +1 -1
  37. data/lib/chef/knife/supermarket_unshare.rb +1 -1
  38. data/lib/chef/log.rb +1 -1
  39. data/lib/chef/mixin/securable.rb +2 -2
  40. data/lib/chef/powershell.rb +1 -1
  41. data/lib/chef/provider/batch.rb +3 -10
  42. data/lib/chef/provider/cron.rb +2 -14
  43. data/lib/chef/provider/execute.rb +2 -1
  44. data/lib/chef/provider/group/dscl.rb +2 -2
  45. data/lib/chef/provider/group/windows.rb +1 -1
  46. data/lib/chef/provider/ifconfig.rb +7 -7
  47. data/lib/chef/provider/mount/aix.rb +1 -1
  48. data/lib/chef/provider/mount/windows.rb +2 -2
  49. data/lib/chef/provider/noop.rb +1 -1
  50. data/lib/chef/provider/package/openbsd.rb +1 -1
  51. data/lib/chef/provider/package/portage.rb +2 -2
  52. data/lib/chef/provider/package/powershell.rb +6 -2
  53. data/lib/chef/provider/package/rubygems.rb +2 -2
  54. data/lib/chef/provider/package/snap.rb +96 -27
  55. data/lib/chef/provider/package/windows/msi.rb +3 -3
  56. data/lib/chef/provider/package/windows/registry_uninstall_entry.rb +1 -1
  57. data/lib/chef/provider/powershell_script.rb +10 -14
  58. data/lib/chef/provider/remote_file/http.rb +4 -1
  59. data/lib/chef/provider/script.rb +4 -75
  60. data/lib/chef/provider/service/arch.rb +1 -1
  61. data/lib/chef/provider/service/debian.rb +2 -2
  62. data/lib/chef/provider/service/openbsd.rb +4 -4
  63. data/lib/chef/provider/service/redhat.rb +1 -1
  64. data/lib/chef/provider/service/windows.rb +1 -1
  65. data/lib/chef/provider/subversion.rb +2 -2
  66. data/lib/chef/provider/user/dscl.rb +4 -4
  67. data/lib/chef/provider/user/linux.rb +3 -3
  68. data/lib/chef/provider/user/mac.rb +5 -5
  69. data/lib/chef/provider/windows_script.rb +87 -25
  70. data/lib/chef/provider/zypper_repository.rb +30 -10
  71. data/lib/chef/resource.rb +22 -11
  72. data/lib/chef/resource/apt_package.rb +1 -1
  73. data/lib/chef/resource/archive_file.rb +28 -8
  74. data/lib/chef/resource/bash.rb +0 -1
  75. data/lib/chef/resource/batch.rb +4 -2
  76. data/lib/chef/resource/chef_client_scheduled_task.rb +13 -1
  77. data/lib/chef/resource/cron/_cron_shared.rb +98 -0
  78. data/lib/chef/resource/cron/cron.rb +46 -0
  79. data/lib/chef/resource/{cron_d.rb → cron/cron_d.rb} +7 -87
  80. data/lib/chef/resource/cron_access.rb +11 -3
  81. data/lib/chef/resource/csh.rb +0 -1
  82. data/lib/chef/resource/execute.rb +477 -7
  83. data/lib/chef/resource/file.rb +1 -1
  84. data/lib/chef/resource/freebsd_package.rb +1 -1
  85. data/lib/chef/resource/helpers/cron_validations.rb +6 -3
  86. data/lib/chef/resource/homebrew_package.rb +30 -1
  87. data/lib/chef/resource/homebrew_update.rb +107 -0
  88. data/lib/chef/resource/hostname.rb +6 -19
  89. data/lib/chef/resource/kernel_module.rb +14 -1
  90. data/lib/chef/resource/mount.rb +1 -1
  91. data/lib/chef/resource/perl.rb +0 -1
  92. data/lib/chef/resource/plist.rb +23 -4
  93. data/lib/chef/resource/powershell_script.rb +4 -2
  94. data/lib/chef/resource/python.rb +0 -1
  95. data/lib/chef/resource/remote_file.rb +26 -10
  96. data/lib/chef/resource/ruby.rb +0 -1
  97. data/lib/chef/resource/template.rb +1 -1
  98. data/lib/chef/resource/windows_ad_join.rb +30 -1
  99. data/lib/chef/resource/windows_audit_policy.rb +227 -0
  100. data/lib/chef/resource/windows_auto_run.rb +11 -0
  101. data/lib/chef/resource/windows_certificate.rb +26 -0
  102. data/lib/chef/resource/windows_font.rb +3 -3
  103. data/lib/chef/resource/windows_package.rb +1 -1
  104. data/lib/chef/resource/windows_pagefile.rb +1 -1
  105. data/lib/chef/resource/windows_script.rb +2 -16
  106. data/lib/chef/resource/windows_security_policy.rb +17 -15
  107. data/lib/chef/resource/windows_shortcut.rb +1 -2
  108. data/lib/chef/resource/windows_task.rb +4 -4
  109. data/lib/chef/resource/windows_user_privilege.rb +5 -5
  110. data/lib/chef/resource/yum_repository.rb +9 -9
  111. data/lib/chef/resources.rb +4 -2
  112. data/lib/chef/search/query.rb +1 -1
  113. data/lib/chef/util/diff.rb +2 -2
  114. data/lib/chef/util/windows/net_user.rb +1 -1
  115. data/lib/chef/util/windows/volume.rb +1 -1
  116. data/lib/chef/version.rb +1 -1
  117. data/lib/chef/win32/file.rb +1 -1
  118. data/lib/chef/win32/registry.rb +2 -2
  119. data/lib/chef/win32/security.rb +1 -1
  120. data/spec/data/lwrp/providers/buck_passer.rb +1 -1
  121. data/spec/data/lwrp/providers/buck_passer_2.rb +1 -1
  122. data/spec/data/lwrp/providers/embedded_resource_accesses_providers_scope.rb +1 -1
  123. data/spec/functional/resource/cron_spec.rb +10 -0
  124. data/spec/functional/resource/remote_file_spec.rb +2 -2
  125. data/spec/functional/resource/windows_task_spec.rb +8 -8
  126. data/spec/support/platform_helpers.rb +1 -1
  127. data/spec/support/platforms/win32/spec_service.rb +1 -1
  128. data/spec/support/shared/functional/execute_resource.rb +1 -1
  129. data/spec/support/shared/unit/execute_resource.rb +1 -1
  130. data/spec/unit/application_spec.rb +7 -0
  131. data/spec/unit/data_bag_spec.rb +1 -1
  132. data/spec/unit/http/ssl_policies_spec.rb +20 -0
  133. data/spec/unit/knife/bootstrap_spec.rb +2 -2
  134. data/spec/unit/mixin/user_context_spec.rb +1 -9
  135. data/spec/unit/property_spec.rb +1 -1
  136. data/spec/unit/provider/batch_spec.rb +130 -0
  137. data/spec/unit/provider/cron_spec.rb +9 -49
  138. data/spec/unit/provider/package/powershell_spec.rb +95 -86
  139. data/spec/unit/provider/package/snap_spec.rb +1 -1
  140. data/spec/unit/provider/powershell_script_spec.rb +3 -45
  141. data/spec/unit/provider/script_spec.rb +20 -110
  142. data/spec/unit/provider/zypper_repository_spec.rb +60 -10
  143. data/spec/unit/resource/archive_file_spec.rb +11 -2
  144. data/spec/unit/resource/chef_client_scheduled_task_spec.rb +17 -7
  145. data/spec/unit/resource/cron_spec.rb +2 -2
  146. data/spec/unit/resource/helpers/cron_validations_spec.rb +5 -1
  147. data/spec/unit/resource/homebrew_update_spec.rb +30 -0
  148. data/spec/unit/resource/powershell_script_spec.rb +10 -15
  149. data/spec/unit/resource/timezone_spec.rb +1 -1
  150. data/spec/unit/resource/windows_audit_policy_spec.rb +64 -0
  151. data/spec/unit/resource/windows_dns_record_spec.rb +3 -3
  152. data/spec/unit/resource/windows_dns_zone_spec.rb +2 -2
  153. data/spec/unit/resource/windows_task_spec.rb +1 -1
  154. data/spec/unit/resource/windows_uac_spec.rb +2 -2
  155. data/spec/unit/resource/yum_repository_spec.rb +21 -21
  156. data/spec/unit/resource_spec.rb +67 -1
  157. data/spec/unit/util/dsc/configuration_generator_spec.rb +1 -1
  158. data/spec/unit/util/threaded_job_queue_spec.rb +9 -0
  159. metadata +22 -22
  160. data/lib/chef/resource/cron.rb +0 -157
@@ -28,7 +28,7 @@ class Chef
28
28
  provides(:cron_manage) # legacy name @todo in Chef 15 we should { true } this so it wins over the cookbook
29
29
 
30
30
  introduced "14.4"
31
- description "Use the **cron_access** resource to manage the /etc/cron.allow and /etc/cron.deny files. Note: This resource previously shipped in the `cron` cookbook as `cron_manage`, which it can still be used as for backwards compatibility with existing Chef Infra Client releases."
31
+ description "Use the **cron_access** resource to manage cron's cron.allow and cron.deny files. Note: This resource previously shipped in the `cron` cookbook as `cron_manage`, which it can still be used as for backwards compatibility with existing Chef Infra Client releases."
32
32
  examples <<~DOC
33
33
  **Add the mike user to cron.allow**
34
34
 
@@ -58,11 +58,18 @@ class Chef
58
58
  description: "An optional property to set the user name if it differs from the resource block's name.",
59
59
  name_property: true
60
60
 
61
+ CRON_PATHS = {
62
+ "aix" => "/var/adm/cron",
63
+ "solaris" => "/etc/cron.d",
64
+ "default" => "/etc",
65
+ }.freeze
66
+
61
67
  action :allow do
62
68
  description "Add the user to the cron.allow file."
69
+ allow_path = ::File.join(value_for_platform_family(CRON_PATHS), "cron.allow")
63
70
 
64
71
  with_run_context :root do
65
- edit_resource(:template, "/etc/cron.allow") do |new_resource|
72
+ edit_resource(:template, allow_path) do |new_resource|
66
73
  source ::File.expand_path("../support/cron_access.erb", __FILE__)
67
74
  local true
68
75
  mode "0600"
@@ -76,9 +83,10 @@ class Chef
76
83
 
77
84
  action :deny do
78
85
  description "Add the user to the cron.deny file."
86
+ deny_path = ::File.join(value_for_platform_family(CRON_PATHS), "cron.deny")
79
87
 
80
88
  with_run_context :root do
81
- edit_resource(:template, "/etc/cron.deny") do |new_resource|
89
+ edit_resource(:template, deny_path) do |new_resource|
82
90
  source ::File.expand_path("../support/cron_access.erb", __FILE__)
83
91
  local true
84
92
  mode "0600"
@@ -17,7 +17,6 @@
17
17
  #
18
18
 
19
19
  require_relative "script"
20
- require_relative "../provider/script"
21
20
 
22
21
  class Chef
23
22
  class Resource
@@ -27,10 +27,476 @@ class Chef
27
27
 
28
28
  provides :execute, target_mode: true
29
29
 
30
- description "Use the **execute** resource to execute a single command. Commands that"\
31
- " are executed with this resource are (by their nature) not idempotent,"\
32
- " as they are typically unique to the environment in which they are run."\
33
- " Use not_if and only_if to guard this resource for idempotence."
30
+ description "Use the **execute** resource to execute a single command. Commands that are executed with this resource are (by their nature) not idempotent, as they are typically unique to the environment in which they are run. Use not_if and only_if to guard this resource for idempotence. Note: Use the **script** resource to execute a script using a specific interpreter (Ruby, Python, Perl, csh, or Bash)."
31
+
32
+ examples <<~EXAMPLES
33
+ **Run a command upon notification**:
34
+
35
+ ```ruby
36
+ execute 'slapadd' do
37
+ command 'slapadd < /tmp/something.ldif'
38
+ creates '/var/lib/slapd/uid.bdb'
39
+
40
+ action :nothing
41
+ end
42
+
43
+ template '/tmp/something.ldif' do
44
+ source 'something.ldif'
45
+
46
+ notifies :run, 'execute[slapadd]', :immediately
47
+ end
48
+ ```
49
+
50
+ **Run a touch file only once while running a command**:
51
+
52
+ ```ruby
53
+ execute 'upgrade script' do
54
+ command 'php upgrade-application.php && touch /var/application/.upgraded'
55
+
56
+ creates '/var/application/.upgraded'
57
+ action :run
58
+ end
59
+ ```
60
+
61
+ **Run a command which requires an environment variable**:
62
+
63
+ ```ruby
64
+ execute 'slapadd' do
65
+ command 'slapadd < /tmp/something.ldif'
66
+ creates '/var/lib/slapd/uid.bdb'
67
+
68
+ action :run
69
+ environment ({'HOME' => '/home/my_home'})
70
+ end
71
+ ```
72
+
73
+ **Delete a repository using yum to scrub the cache**:
74
+
75
+ ```ruby
76
+ # the following code sample thanks to gaffneyc @ https://gist.github.com/918711
77
+ execute 'clean-yum-cache' do
78
+ command 'yum clean all'
79
+ action :nothing
80
+ end
81
+
82
+ file '/etc/yum.repos.d/bad.repo' do
83
+ action :delete
84
+ notifies :run, 'execute[clean-yum-cache]', :immediately
85
+ end
86
+ ```
87
+
88
+ **Prevent restart and reconfigure if configuration is broken**:
89
+
90
+ Use the `:nothing` action (common to all resources) to prevent the test from
91
+ starting automatically, and then use the `subscribes` notification to run a
92
+ configuration test when a change to the template is detected.
93
+
94
+ ```ruby
95
+ execute 'test-nagios-config' do
96
+ command 'nagios3 --verify-config'
97
+ action :nothing
98
+ subscribes :run, 'template[/etc/nagios3/configures-nagios.conf]', :immediately
99
+ end
100
+ ```
101
+
102
+ **Notify in a specific order**:
103
+
104
+ To notify multiple resources, and then have these resources run in a certain
105
+ order, do something like the following.
106
+
107
+ ```ruby
108
+ execute 'foo' do
109
+ command '...'
110
+ notifies :create, 'template[baz]', :immediately
111
+ notifies :install, 'package[bar]', :immediately
112
+ notifies :run, 'execute[final]', :immediately
113
+ end
114
+
115
+ template 'baz' do
116
+ #...
117
+ notifies :run, 'execute[restart_baz]', :immediately
118
+ end
119
+
120
+ package 'bar'
121
+ execute 'restart_baz'
122
+ execute 'final' do
123
+ command '...'
124
+ end
125
+ ```
126
+
127
+ where the sequencing will be in the same order as the resources are listed in
128
+ the recipe: `execute 'foo'`, `template 'baz'`, `execute [restart_baz]`,
129
+ `package 'bar'`, and `execute 'final'`.
130
+
131
+ **Execute a command using a template**:
132
+
133
+ The following example shows how to set up IPv4 packet forwarding using the
134
+ **execute** resource to run a command named `forward_ipv4` that uses a template
135
+ defined by the **template** resource.
136
+
137
+ ```ruby
138
+ execute 'forward_ipv4' do
139
+ command 'echo > /proc/.../ipv4/ip_forward'
140
+ action :nothing
141
+ end
142
+
143
+ template '/etc/file_name.conf' do
144
+ source 'routing/file_name.conf.erb'
145
+
146
+ notifies :run, 'execute[forward_ipv4]', :delayed
147
+ end
148
+ ```
149
+
150
+ where the `command` property for the **execute** resource contains the command
151
+ that is to be run and the `source` property for the **template** resource
152
+ specifies which template to use. The `notifies` property for the **template**
153
+ specifies that the `execute[forward_ipv4]` (which is defined by the **execute**
154
+ resource) should be queued up and run at the end of a Chef Infra Client run.
155
+
156
+ **Add a rule to an IP table**:
157
+
158
+ The following example shows how to add a rule named `test_rule` to an IP table
159
+ using the **execute** resource to run a command using a template that is defined
160
+ by the **template** resource:
161
+
162
+ ```ruby
163
+ execute 'test_rule' do
164
+ command 'command_to_run
165
+ --option value
166
+ --option value
167
+ --source \#{node[:name_of_node][:ipsec][:local][:subnet]}
168
+ -j test_rule'
169
+
170
+ action :nothing
171
+ end
172
+
173
+ template '/etc/file_name.local' do
174
+ source 'routing/file_name.local.erb'
175
+ notifies :run, 'execute[test_rule]', :delayed
176
+ end
177
+ ```
178
+
179
+ where the `command` property for the **execute** resource contains the command
180
+ that is to be run and the `source` property for the **template** resource
181
+ specifies which template to use. The `notifies` property for the **template**
182
+ specifies that the `execute[test_rule]` (which is defined by the **execute**
183
+ resource) should be queued up and run at the end of a Chef Infra Client run.
184
+
185
+ **Stop a service, do stuff, and then restart it**:
186
+
187
+ The following example shows how to use the **execute**, **service**, and
188
+ **mount** resources together to ensure that a node running on Amazon EC2 is
189
+ running MySQL. This example does the following:
190
+
191
+ - Checks to see if the Amazon EC2 node has MySQL
192
+ - If the node has MySQL, stops MySQL
193
+ - Installs MySQL
194
+ - Mounts the node
195
+ - Restarts MySQL
196
+
197
+ ```ruby
198
+ # the following code sample comes from the ``server_ec2``
199
+ # recipe in the following cookbook:
200
+ # https://github.com/chef-cookbooks/mysql
201
+
202
+ if (node.attribute?('ec2') && !FileTest.directory?(node['mysql']['ec2_path']))
203
+ service 'mysql' do
204
+ action :stop
205
+ end
206
+
207
+ execute 'install-mysql' do
208
+ command "mv \#{node['mysql']['data_dir']} \#{node['mysql']['ec2_path']}"
209
+ not_if { ::File.directory?(node['mysql']['ec2_path']) }
210
+ end
211
+
212
+ [node['mysql']['ec2_path'], node['mysql']['data_dir']].each do |dir|
213
+ directory dir do
214
+ owner 'mysql'
215
+ group 'mysql'
216
+ end
217
+ end
218
+
219
+ mount node['mysql']['data_dir'] do
220
+ device node['mysql']['ec2_path']
221
+ fstype 'none'
222
+ options 'bind,rw'
223
+ action [:mount, :enable]
224
+ end
225
+
226
+ service 'mysql' do
227
+ action :start
228
+ end
229
+ end
230
+ ```
231
+
232
+ where
233
+
234
+ - the two **service** resources are used to stop, and then restart the MySQL service
235
+ - the **execute** resource is used to install MySQL
236
+ - the **mount** resource is used to mount the node and enable MySQL
237
+
238
+ **Use the platform_family? method**:
239
+
240
+ The following is an example of using the `platform_family?` method in the Recipe
241
+ DSL to create a variable that can be used with other resources in the same
242
+ recipe. In this example, `platform_family?` is being used to ensure that a
243
+ specific binary is used for a specific platform before using the **remote_file**
244
+ resource to download a file from a remote location, and then using the
245
+ **execute** resource to install that file by running a command.
246
+
247
+ ```ruby
248
+ if platform_family?('rhel')
249
+ pip_binary = '/usr/bin/pip'
250
+ else
251
+ pip_binary = '/usr/local/bin/pip'
252
+ end
253
+
254
+ remote_file "\#{Chef::Config[:file_cache_path]}/distribute_setup.py" do
255
+ source 'http://python-distribute.org/distribute_setup.py'
256
+ mode '0755'
257
+ not_if { ::File.exist?(pip_binary) }
258
+ end
259
+
260
+ execute 'install-pip' do
261
+ cwd Chef::Config[:file_cache_path]
262
+ command <<~EOF
263
+ # command for installing Python goes here
264
+ EOF
265
+ not_if { ::File.exist?(pip_binary) }
266
+ end
267
+ ```
268
+
269
+ where a command for installing Python might look something like:
270
+
271
+ ```ruby
272
+ \#{node['python']['binary']} distribute_setup.py \#{::File.dirname(pip_binary)}/easy_install pip
273
+ ```
274
+
275
+ **Control a service using the execute resource**:
276
+
277
+ <div class="admonition-warning">
278
+ <p class="admonition-warning-title">Warning</p>
279
+ <div class="admonition-warning-text">
280
+ This is an example of something that should NOT be done. Use the **service**
281
+ resource to control a service, not the **execute** resource.
282
+ </div>
283
+ </div>
284
+
285
+ Do something like this:
286
+
287
+ ```ruby
288
+ service 'tomcat' do
289
+ action :start
290
+ end
291
+ ```
292
+
293
+ and NOT something like this:
294
+
295
+ ```ruby
296
+ execute 'start-tomcat' do
297
+ command '/etc/init.d/tomcat start'
298
+ action :run
299
+ end
300
+ ```
301
+
302
+ There is no reason to use the **execute** resource to control a service because
303
+ the **service** resource exposes the `start_command` property directly, which
304
+ gives a recipe full control over the command issued in a much cleaner, more
305
+ direct manner.
306
+
307
+ **Use the search recipe DSL method to find users**:
308
+
309
+ The following example shows how to use the `search` method in the Recipe DSL to
310
+ search for users:
311
+
312
+ ```ruby
313
+ # the following code sample comes from the openvpn cookbook:
314
+
315
+ search("users", "*:*") do |u|
316
+ execute "generate-openvpn-\#{u['id']}" do
317
+ command "./pkitool \#{u['id']}"
318
+ cwd '/etc/openvpn/easy-rsa'
319
+ end
320
+
321
+ %w{ conf ovpn }.each do |ext|
322
+ template "\#{node['openvpn']['key_dir']}/\#{u['id']}.\#{ext}" do
323
+ source 'client.conf.erb'
324
+ variables :username => u['id']
325
+ end
326
+ end
327
+ end
328
+ ```
329
+
330
+ where
331
+
332
+ - the search data will be used to create **execute** resources
333
+ - the **template** resource tells Chef Infra Client which template to use
334
+
335
+ **Enable remote login for macOS**:
336
+
337
+ ```ruby
338
+ execute 'enable ssh' do
339
+ command '/usr/sbin/systemsetup -setremotelogin on'
340
+ not_if '/usr/sbin/systemsetup -getremotelogin | /usr/bin/grep On'
341
+ action :run
342
+ end
343
+ ```
344
+
345
+ **Execute code immediately, based on the template resource**:
346
+
347
+ By default, notifications are `:delayed`, that is they are queued up as they are
348
+ triggered, and then executed at the very end of a Chef Infra Client run. To run
349
+ kan action immediately, use `:immediately`:
350
+
351
+ ```ruby
352
+ template '/etc/nagios3/configures-nagios.conf' do
353
+ # other parameters
354
+ notifies :run, 'execute[test-nagios-config]', :immediately
355
+ end
356
+ ```
357
+
358
+ and then Chef Infra Client would immediately run the following:
359
+
360
+ ```ruby
361
+ execute 'test-nagios-config' do
362
+ command 'nagios3 --verify-config'
363
+ action :nothing
364
+ end
365
+ ```
366
+
367
+ **Sourcing a file**:
368
+
369
+ The **execute** resource cannot be used to source a file (e.g. `command 'source
370
+ filename'`). The following example will fail because `source` is not an
371
+ executable:
372
+
373
+ ```ruby
374
+ execute 'foo' do
375
+ command 'source /tmp/foo.sh'
376
+ end
377
+ ```
378
+
379
+
380
+ Instead, use the **script** resource or one of the **script**-based resources
381
+ (**bash**, **csh**, **perl**, **python**, or **ruby**). For example:
382
+
383
+ ```ruby
384
+ bash 'foo' do
385
+ code 'source /tmp/foo.sh'
386
+ end
387
+ ```
388
+
389
+ **Run a Knife command**:
390
+
391
+ ```ruby
392
+ execute 'create_user' do
393
+ command <<~EOM
394
+ knife user create \#{user}
395
+ --admin
396
+ --password password
397
+ --disable-editing
398
+ --file /home/vagrant/.chef/user.pem
399
+ --config /tmp/knife-admin.rb
400
+ EOM
401
+ end
402
+ ```
403
+
404
+ **Run install command into virtual environment**:
405
+
406
+ The following example shows how to install a lightweight JavaScript framework
407
+ into Vagrant:
408
+
409
+ ```ruby
410
+ execute "install q and zombiejs" do
411
+ cwd "/home/vagrant"
412
+ user "vagrant"
413
+ environment ({'HOME' => '/home/vagrant', 'USER' => 'vagrant'})
414
+ command "npm install -g q zombie should mocha coffee-script"
415
+ action :run
416
+ end
417
+ ```
418
+
419
+ **Run a command as a named user**:
420
+
421
+ The following example shows how to run `bundle install` from a Chef Infra Client
422
+ run as a specific user. This will put the gem into the path of the user
423
+ (`vagrant`) instead of the root user (under which the Chef Infra Client runs):
424
+
425
+ ```ruby
426
+ execute '/opt/chefdk/embedded/bin/bundle install' do
427
+ cwd node['chef_workstation']['bundler_path']
428
+ user node['chef_workstation']['user']
429
+
430
+ environment ({
431
+ 'HOME' => "/home/\#{node['chef_workstation']['user']}",
432
+ 'USER' => node['chef_workstation']['user']
433
+ })
434
+ not_if 'bundle check'
435
+ end
436
+ ```
437
+
438
+ **Run a command as an alternate user**:
439
+
440
+ *Note*: When Chef is running as a service, this feature requires that the user
441
+ that Chef runs as has 'SeAssignPrimaryTokenPrivilege' (aka
442
+ 'SE_ASSIGNPRIMARYTOKEN_NAME') user right. By default only LocalSystem and
443
+ NetworkService have this right when running as a service. This is necessary
444
+ even if the user is an Administrator.
445
+
446
+ This right can be added and checked in a recipe using this example:
447
+
448
+ ```ruby
449
+ # Add 'SeAssignPrimaryTokenPrivilege' for the user
450
+ Chef::ReservedNames::Win32::Security.add_account_right('<user>', 'SeAssignPrimaryTokenPrivilege')
451
+
452
+ # Check if the user has 'SeAssignPrimaryTokenPrivilege' rights
453
+ Chef::ReservedNames::Win32::Security.get_account_right('<user>').include?('SeAssignPrimaryTokenPrivilege')
454
+ ```
455
+
456
+ The following example shows how to run `mkdir test_dir` from a Chef Infra Client
457
+ run as an alternate user.
458
+
459
+ ```ruby
460
+ # Passing only username and password
461
+ execute 'mkdir test_dir' do
462
+ cwd Chef::Config[:file_cache_path]
463
+
464
+ user "username"
465
+ password "password"
466
+ end
467
+
468
+ # Passing username and domain
469
+ execute 'mkdir test_dir' do
470
+ cwd Chef::Config[:file_cache_path]
471
+
472
+ domain "domain-name"
473
+ user "user"
474
+ password "password"
475
+ end
476
+
477
+ # Passing username = 'domain-name\\username'. No domain is passed
478
+ execute 'mkdir test_dir' do
479
+ cwd Chef::Config[:file_cache_path]
480
+
481
+ user "domain-name\\username"
482
+ password "password"
483
+ end
484
+
485
+ # Passing username = 'username@domain-name'. No domain is passed
486
+ execute 'mkdir test_dir' do
487
+ cwd Chef::Config[:file_cache_path]
488
+
489
+ user "username@domain-name"
490
+ password "password"
491
+ end
492
+ ```
493
+
494
+ **Run a command with an external input file**:
495
+
496
+ execute 'md5sum' do
497
+ input File.read(__FILE__)
498
+ end
499
+ EXAMPLES
34
500
 
35
501
  # The ResourceGuardInterpreter wraps a resource's guards in another resource. That inner resource
36
502
  # needs to behave differently during (for example) why_run mode, so we flag it here. For why_run mode
@@ -62,13 +528,13 @@ class Chef
62
528
  description: "The current working directory from which the command will be run."
63
529
 
64
530
  property :environment, Hash,
65
- description: "A Hash of environment variables in the form of ({'ENV_VARIABLE' => 'VALUE'})."
531
+ description: "A Hash of environment variables in the form of `({'ENV_VARIABLE' => 'VALUE'})`. **Note**: These variables must exist for a command to be run successfully."
66
532
 
67
533
  property :group, [ String, Integer ],
68
534
  description: "The group name or group ID that must be changed before running a command."
69
535
 
70
536
  property :live_stream, [ TrueClass, FalseClass ], default: false,
71
- description: "Send the output of the command run by this execute resource block to the #{Chef::Dist::CLIENT} event stream."
537
+ description: "Send the output of the command run by this execute resource block to the #{Chef::Dist::PRODUCT} event stream."
72
538
 
73
539
  # default_env defaults to `false` so that the command execution more exactly matches what the user gets on the command line without magic
74
540
  property :default_env, [ TrueClass, FalseClass ], desired_state: false, default: false,
@@ -96,13 +562,17 @@ class Chef
96
562
 
97
563
  # lazy used to set default value of sensitive to true if password is set
98
564
  property :sensitive, [ TrueClass, FalseClass ],
99
- description: "Ensure that sensitive resource data is not logged by the #{Chef::Dist::CLIENT}.",
565
+ description: "Ensure that sensitive resource data is not logged by the #{Chef::Dist::PRODUCT}.",
100
566
  default: lazy { password ? true : false }, default_description: "True if the password property is set. False otherwise."
101
567
 
102
568
  property :elevated, [ TrueClass, FalseClass ], default: false,
103
569
  description: "Determines whether the script will run with elevated permissions to circumvent User Access Control (UAC) interactively blocking the process.\nThis will cause the process to be run under a batch login instead of an interactive login. The user running #{Chef::Dist::CLIENT} needs the 'Replace a process level token' and 'Adjust Memory Quotas for a process' permissions. The user that is running the command needs the 'Log on as a batch job' permission.\nBecause this requires a login, the user and password properties are required.",
104
570
  introduced: "13.3"
105
571
 
572
+ property :input, [String],
573
+ introduced: "16.2",
574
+ description: "An optional property to set the input sent to the command as STDIN."
575
+
106
576
  alias :env :environment
107
577
 
108
578
  def self.set_guard_inherited_attributes(*inherited_attributes)