chef 18.1.29-x64-mingw-ucrt → 18.2.7-x64-mingw-ucrt

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 937611f440a583a253b01525212c4d6214da8f25aee63891ab928b9a3d53de67
4
- data.tar.gz: 7d69aeb9e4df6f13d76b464c08178f9935bc9be01eed136539d5d123315f0fea
3
+ metadata.gz: a313783b0386b4ed50ef119bf7b37e014adccab2341396d7d11c9bc0e5a6ce3d
4
+ data.tar.gz: 74be0fa290f08d00d77b0cdb68caf7dd84b929ce289fd2b80b11114a488f0597
5
5
  SHA512:
6
- metadata.gz: 2bc789e6367a7ba5277f905d460f7b5390854f62c98f0ba07270e6659e7e70bb92b2d4fc64c8d87e524a972da75657f64022d3f01305558e00f90348f8d6811a
7
- data.tar.gz: dea177b817a903ef86d7b8bacef0aca894ca778c26615339a041186276da976eb23abede8c47c1a3b9ee459a392961ff75fbc8532475186a1d21d77a1a528fde
6
+ metadata.gz: ddafcb71010f1ef7bf289d450b2d2851016d9e3cae93fb04b9fcc17255fdba206ae105eaf585f56aebce0c9e1284a7fe07da198dae33796d714b47fb1a269ad9
7
+ data.tar.gz: cece71ceaef6808e4c9b966d906004e8ecc5bbfc3102f4bbcf619d28e9fd27acd22799fffe34ab4c19c7e4acd74e3823333a9870df9546881316431ad98f27ad
@@ -15,9 +15,9 @@ gemspec.add_dependency "wmi-lite", "~> 1.0"
15
15
  gemspec.add_dependency "win32-taskscheduler", "~> 2.0"
16
16
  gemspec.add_dependency "iso8601", ">= 0.12.1", "< 0.14" # validate 0.14 when it comes out
17
17
  gemspec.add_dependency "win32-certstore", "~> 0.6.15" # 0.5+ required for specifying user vs. system store
18
- gemspec.add_dependency "chef-powershell", "~> 1.0.12" # The guts of the powershell_exec code have been moved to its own gem, chef-powershell. It's part of the chef-powershell-shim repo.
18
+ gemspec.add_dependency "chef-powershell", "~> 18.0.0" # The guts of the powershell_exec code have been moved to its own gem, chef-powershell. It's part of the chef-powershell-shim repo.
19
19
 
20
20
  gemspec.extensions << "ext/win32-eventlog/Rakefile"
21
21
  gemspec.files += Dir.glob("{distro,ext}/**/*")
22
22
 
23
- gemspec
23
+ gemspec
data/chef.gemspec CHANGED
@@ -49,8 +49,7 @@ Gem::Specification.new do |s|
49
49
  s.add_dependency "net-ftp" # remote_file resource
50
50
  s.add_dependency "erubis", "~> 2.7" # template resource / cookbook syntax check
51
51
  s.add_dependency "diff-lcs", ">= 1.2.4", "!= 1.4.0", "< 1.6.0" # 1.4 breaks output. Used in lib/chef/util/diff
52
- # s.add_dependency "ffi-libarchive", "~> 1.0", ">= 1.0.3" # archive_file resource
53
- s.add_dependency "ffi-libarchive", "~> 1.1", ">= 1.1.3"
52
+ s.add_dependency "ffi-libarchive", "~> 1.0", ">= 1.0.3" # archive_file resource
54
53
  s.add_dependency "chef-zero", ">= 14.0.11"
55
54
  s.add_dependency "chef-vault" # chef-vault resources and helpers
56
55
 
@@ -0,0 +1,459 @@
1
+ 
2
+ function Load-Win32Bindings {
3
+ Add-Type -TypeDefinition @"
4
+ using System;
5
+ using System.Diagnostics;
6
+ using System.Runtime.InteropServices;
7
+
8
+ namespace Chef
9
+ {
10
+
11
+ [StructLayout(LayoutKind.Sequential)]
12
+ public struct PROCESS_INFORMATION
13
+ {
14
+ public IntPtr hProcess;
15
+ public IntPtr hThread;
16
+ public uint dwProcessId;
17
+ public uint dwThreadId;
18
+ }
19
+
20
+ [StructLayout(LayoutKind.Sequential, CharSet = CharSet.Unicode)]
21
+ public struct STARTUPINFO
22
+ {
23
+ public uint cb;
24
+ public string lpReserved;
25
+ public string lpDesktop;
26
+ public string lpTitle;
27
+ public uint dwX;
28
+ public uint dwY;
29
+ public uint dwXSize;
30
+ public uint dwYSize;
31
+ public uint dwXCountChars;
32
+ public uint dwYCountChars;
33
+ public uint dwFillAttribute;
34
+ public STARTF dwFlags;
35
+ public ShowWindow wShowWindow;
36
+ public short cbReserved2;
37
+ public IntPtr lpReserved2;
38
+ public IntPtr hStdInput;
39
+ public IntPtr hStdOutput;
40
+ public IntPtr hStdError;
41
+ }
42
+
43
+ [StructLayout(LayoutKind.Sequential)]
44
+ public struct SECURITY_ATTRIBUTES
45
+ {
46
+ public int length;
47
+ public IntPtr lpSecurityDescriptor;
48
+ public bool bInheritHandle;
49
+ }
50
+
51
+ [Flags]
52
+ public enum CreationFlags : int
53
+ {
54
+ NONE = 0,
55
+ DEBUG_PROCESS = 0x00000001,
56
+ DEBUG_ONLY_THIS_PROCESS = 0x00000002,
57
+ CREATE_SUSPENDED = 0x00000004,
58
+ DETACHED_PROCESS = 0x00000008,
59
+ CREATE_NEW_CONSOLE = 0x00000010,
60
+ CREATE_NEW_PROCESS_GROUP = 0x00000200,
61
+ CREATE_UNICODE_ENVIRONMENT = 0x00000400,
62
+ CREATE_SEPARATE_WOW_VDM = 0x00000800,
63
+ CREATE_SHARED_WOW_VDM = 0x00001000,
64
+ CREATE_PROTECTED_PROCESS = 0x00040000,
65
+ EXTENDED_STARTUPINFO_PRESENT = 0x00080000,
66
+ CREATE_BREAKAWAY_FROM_JOB = 0x01000000,
67
+ CREATE_PRESERVE_CODE_AUTHZ_LEVEL = 0x02000000,
68
+ CREATE_DEFAULT_ERROR_MODE = 0x04000000,
69
+ CREATE_NO_WINDOW = 0x08000000,
70
+ }
71
+
72
+ [Flags]
73
+ public enum STARTF : uint
74
+ {
75
+ STARTF_USESHOWWINDOW = 0x00000001,
76
+ STARTF_USESIZE = 0x00000002,
77
+ STARTF_USEPOSITION = 0x00000004,
78
+ STARTF_USECOUNTCHARS = 0x00000008,
79
+ STARTF_USEFILLATTRIBUTE = 0x00000010,
80
+ STARTF_RUNFULLSCREEN = 0x00000020, // ignored for non-x86 platforms
81
+ STARTF_FORCEONFEEDBACK = 0x00000040,
82
+ STARTF_FORCEOFFFEEDBACK = 0x00000080,
83
+ STARTF_USESTDHANDLES = 0x00000100,
84
+ }
85
+
86
+ public enum ShowWindow : short
87
+ {
88
+ SW_HIDE = 0,
89
+ SW_SHOWNORMAL = 1,
90
+ SW_NORMAL = 1,
91
+ SW_SHOWMINIMIZED = 2,
92
+ SW_SHOWMAXIMIZED = 3,
93
+ SW_MAXIMIZE = 3,
94
+ SW_SHOWNOACTIVATE = 4,
95
+ SW_SHOW = 5,
96
+ SW_MINIMIZE = 6,
97
+ SW_SHOWMINNOACTIVE = 7,
98
+ SW_SHOWNA = 8,
99
+ SW_RESTORE = 9,
100
+ SW_SHOWDEFAULT = 10,
101
+ SW_FORCEMINIMIZE = 11,
102
+ SW_MAX = 11
103
+ }
104
+
105
+ public enum StandardHandle : int
106
+ {
107
+ Input = -10,
108
+ Output = -11,
109
+ Error = -12
110
+ }
111
+
112
+ public enum HandleFlags : int
113
+ {
114
+ HANDLE_FLAG_INHERIT = 0x00000001,
115
+ HANDLE_FLAG_PROTECT_FROM_CLOSE = 0x00000002
116
+ }
117
+
118
+ public static class Kernel32
119
+ {
120
+ [DllImport("kernel32.dll", SetLastError=true)]
121
+ [return: MarshalAs(UnmanagedType.Bool)]
122
+ public static extern bool CreateProcess(
123
+ string lpApplicationName,
124
+ string lpCommandLine,
125
+ ref SECURITY_ATTRIBUTES lpProcessAttributes,
126
+ ref SECURITY_ATTRIBUTES lpThreadAttributes,
127
+ [MarshalAs(UnmanagedType.Bool)] bool bInheritHandles,
128
+ CreationFlags dwCreationFlags,
129
+ IntPtr lpEnvironment,
130
+ string lpCurrentDirectory,
131
+ ref STARTUPINFO lpStartupInfo,
132
+ out PROCESS_INFORMATION lpProcessInformation);
133
+
134
+ [DllImport("kernel32.dll", SetLastError=true)]
135
+ public static extern IntPtr GetStdHandle(
136
+ StandardHandle nStdHandle);
137
+
138
+ [DllImport("kernel32.dll")]
139
+ public static extern bool SetHandleInformation(
140
+ IntPtr hObject,
141
+ int dwMask,
142
+ uint dwFlags);
143
+
144
+ [DllImport("kernel32", SetLastError=true)]
145
+ [return: MarshalAs(UnmanagedType.Bool)]
146
+ public static extern bool CloseHandle(
147
+ IntPtr hObject);
148
+
149
+ [DllImport("kernel32", SetLastError=true)]
150
+ [return: MarshalAs(UnmanagedType.Bool)]
151
+ public static extern bool GetExitCodeProcess(
152
+ IntPtr hProcess,
153
+ out int lpExitCode);
154
+
155
+ [DllImport("kernel32.dll", SetLastError = true)]
156
+ public static extern bool CreatePipe(
157
+ out IntPtr phReadPipe,
158
+ out IntPtr phWritePipe,
159
+ IntPtr lpPipeAttributes,
160
+ uint nSize);
161
+
162
+ [DllImport("kernel32.dll", SetLastError = true)]
163
+ public static extern bool ReadFile(
164
+ IntPtr hFile,
165
+ [Out] byte[] lpBuffer,
166
+ uint nNumberOfBytesToRead,
167
+ ref int lpNumberOfBytesRead,
168
+ IntPtr lpOverlapped);
169
+
170
+ [DllImport("kernel32.dll", SetLastError = true)]
171
+ public static extern bool PeekNamedPipe(
172
+ IntPtr handle,
173
+ byte[] buffer,
174
+ uint nBufferSize,
175
+ ref uint bytesRead,
176
+ ref uint bytesAvail,
177
+ ref uint BytesLeftThisMessage);
178
+
179
+ public const int STILL_ACTIVE = 259;
180
+ }
181
+ }
182
+ "@
183
+ }
184
+
185
+ function Run-ExecutableAndWait($AppPath, $ArgumentString) {
186
+ # Use the Win32 API to create a new process and wait for it to terminate.
187
+ $null = Load-Win32Bindings
188
+
189
+ $si = New-Object Chef.STARTUPINFO
190
+ $pi = New-Object Chef.PROCESS_INFORMATION
191
+
192
+ $pSec = New-Object Chef.SECURITY_ATTRIBUTES
193
+ $pSec.Length = [System.Runtime.InteropServices.Marshal]::SizeOf($pSec)
194
+ $pSec.bInheritHandle = $true
195
+ $tSec = New-Object Chef.SECURITY_ATTRIBUTES
196
+ $tSec.Length = [System.Runtime.InteropServices.Marshal]::SizeOf($tSec)
197
+ $tSec.bInheritHandle = $true
198
+
199
+ # Create pipe for process stdout
200
+ $ptr = [System.Runtime.InteropServices.Marshal]::AllocHGlobal([System.Runtime.InteropServices.Marshal]::SizeOf($si))
201
+ [System.Runtime.InteropServices.Marshal]::StructureToPtr($pSec, $ptr, $true)
202
+ $hReadOut = [IntPtr]::Zero
203
+ $hWriteOut = [IntPtr]::Zero
204
+ $success = [Chef.Kernel32]::CreatePipe([ref] $hReadOut, [ref] $hWriteOut, $ptr, 0)
205
+ if (-Not $success) {
206
+ $reason = [System.Runtime.InteropServices.Marshal]::GetLastWin32Error()
207
+ throw "Unable to create output pipe. Error code $reason."
208
+ }
209
+ $success = [Chef.Kernel32]::SetHandleInformation($hReadOut, [Chef.HandleFlags]::HANDLE_FLAG_INHERIT, 0)
210
+ if (-Not $success) {
211
+ $reason = [System.Runtime.InteropServices.Marshal]::GetLastWin32Error()
212
+ throw "Unable to set output pipe handle information. Error code $reason."
213
+ }
214
+
215
+ $si.cb = [System.Runtime.InteropServices.Marshal]::SizeOf($si)
216
+ $si.wShowWindow = [Chef.ShowWindow]::SW_SHOW
217
+ $si.dwFlags = [Chef.STARTF]::STARTF_USESTDHANDLES
218
+ $si.hStdOutput = $hWriteOut
219
+ $si.hStdError = $hWriteOut
220
+ $si.hStdInput = [Chef.Kernel32]::GetStdHandle([Chef.StandardHandle]::Input)
221
+
222
+ $success = [Chef.Kernel32]::CreateProcess(
223
+ $AppPath,
224
+ $ArgumentString,
225
+ [ref] $pSec,
226
+ [ref] $tSec,
227
+ $true,
228
+ [Chef.CreationFlags]::NONE,
229
+ [IntPtr]::Zero,
230
+ $pwd,
231
+ [ref] $si,
232
+ [ref] $pi
233
+ )
234
+ if (-Not $success) {
235
+ $reason = [System.Runtime.InteropServices.Marshal]::GetLastWin32Error()
236
+ throw "Unable to create process [$ArgumentString]. Error code $reason."
237
+ }
238
+
239
+ $buffer = New-Object byte[] 1024
240
+
241
+ # Initialize reference variables
242
+ $bytesRead = 0
243
+ $bytesAvailable = 0
244
+ $bytesLeftThisMsg = 0
245
+ $global:LASTEXITCODE = [Chef.Kernel32]::STILL_ACTIVE
246
+
247
+ $isActive = $true
248
+ while ($isActive) {
249
+ $success = [Chef.Kernel32]::GetExitCodeProcess($pi.hProcess, [ref] $global:LASTEXITCODE)
250
+ if (-Not $success) {
251
+ $reason = [System.Runtime.InteropServices.Marshal]::GetLastWin32Error()
252
+ throw "Process exit code unavailable. Error code $reason."
253
+ }
254
+
255
+ $success = [Chef.Kernel32]::PeekNamedPipe(
256
+ $hReadOut,
257
+ $null,
258
+ $buffer.Length,
259
+ [ref] $bytesRead,
260
+ [ref] $bytesAvailable,
261
+ [ref] $bytesLeftThisMsg
262
+ )
263
+ if (-Not $success) {
264
+ $reason = [System.Runtime.InteropServices.Marshal]::GetLastWin32Error()
265
+ throw "Output pipe unavailable for peeking. Error code $reason."
266
+ }
267
+
268
+ if ($bytesRead -gt 0) {
269
+ while ([Chef.Kernel32]::ReadFile($hReadOut, $buffer, $buffer.Length, [ref] $bytesRead, 0)) {
270
+ $output = [Text.Encoding]::UTF8.GetString($buffer, 0, $bytesRead)
271
+ if ($output) {
272
+ $output
273
+ }
274
+ if ($bytesRead -lt $buffer.Length) {
275
+ # Partial buffer indicating the end of stream, break out of ReadFile loop
276
+ # ReadFile will block until:
277
+ # The number of bytes requested is read.
278
+ # A write operation completes on the write end of the pipe.
279
+ # An asynchronous handle is being used and the read is occurring asynchronously.
280
+ # An error occurs.
281
+ break
282
+ }
283
+ }
284
+ } else {
285
+ # For some reason, you can't read from the read-end of the read-pipe before the write end has started
286
+ # to write. Otherwise the process just blocks forever and never returns from the read. So we peek
287
+ # at the pipe until there is something. But don't peek too eagerly. This is stupid stupid stupid.
288
+ # There must be a way to do this without having to peek at a pipe first but I have not found it.
289
+ #
290
+ # Note to the future intrepid soul who wants to fix this:
291
+ # 0) This is related to unreasonable CPU usage by the wrapper PS script on a 1 VCPU VM (either Hyper-V
292
+ # or VirtualBox) running a consumer Windows SKU (Windows 10 for example...). Test it there.
293
+ # 1) Maybe this entire script is unnecessary and the bugs mentioned below have been fixed or don't need
294
+ # to be supported.
295
+ # 2) The server and consumer windows schedulers have different defaults. I had a hard time reproducing
296
+ # any issue on a win 2008 on win 2012 server default setup. See the "foreground application scheduler
297
+ # priority" setting to see if it's relevant.
298
+ # 3) This entire endeavor is silly anyway - why are we reimplementing process forking all over? Maybe try
299
+ # to get the folks above to accept patches instead of extending this crazy script.
300
+ Start-Sleep -s 1
301
+ # Start-Sleep -m 100
302
+ }
303
+
304
+ if ($global:LASTEXITCODE -ne [Chef.Kernel32]::STILL_ACTIVE) {
305
+ $isActive = $false
306
+ }
307
+ }
308
+
309
+ # Cleanup handles
310
+ $success = [Chef.Kernel32]::CloseHandle($pi.hProcess)
311
+ if (-Not $success) {
312
+ $reason = [System.Runtime.InteropServices.Marshal]::GetLastWin32Error()
313
+ throw "Unable to release process handle. Error code $reason."
314
+ }
315
+ $success = [Chef.Kernel32]::CloseHandle($pi.hThread)
316
+ if (-Not $success) {
317
+ $reason = [System.Runtime.InteropServices.Marshal]::GetLastWin32Error()
318
+ throw "Unable to release thread handle. Error code $reason."
319
+ }
320
+ $success = [Chef.Kernel32]::CloseHandle($hWriteOut)
321
+ if (-Not $success) {
322
+ $reason = [System.Runtime.InteropServices.Marshal]::GetLastWin32Error()
323
+ throw "Unable to release output write handle. Error code $reason."
324
+ }
325
+ $success = [Chef.Kernel32]::CloseHandle($hReadOut)
326
+ if (-Not $success) {
327
+ $reason = [System.Runtime.InteropServices.Marshal]::GetLastWin32Error()
328
+ throw "Unable to release output read handle. Error code $reason."
329
+ }
330
+ [System.Runtime.InteropServices.Marshal]::FreeHGlobal($ptr)
331
+ }
332
+
333
+ function Get-ScriptDirectory {
334
+ if (!$PSScriptRoot) {
335
+ $Invocation = (Get-Variable MyInvocation -Scope 1).Value
336
+ $PSScriptRoot = Split-Path $Invocation.MyCommand.Path
337
+ }
338
+ $PSScriptRoot
339
+ }
340
+
341
+ function Run-RubyCommand($command, $argList) {
342
+ # This method exists to take the given list of arguments and get it past ruby's command-line
343
+ # interpreter unscathed and untampered. See https://github.com/ruby/ruby/blob/trunk/win32/win32.c#L1582
344
+ # for a list of transformations that ruby attempts to perform with your command-line arguments
345
+ # before passing it onto a script. The most important task is to defeat the globbing
346
+ # and wild-card expansion that ruby performs. Note that ruby does not use MSVCRT's argc/argv
347
+ # and deliberately reparses the raw command-line instead.
348
+ #
349
+ # To stop ruby from interpreting command-line arguments as globs, they need to be enclosed in '
350
+ # Ruby doesn't allow any escape characters inside '. This unfortunately prevents us from sending
351
+ # any strings which themselves contain '. Ruby does allow multi-fragment arguments though.
352
+ # "foo bar"'baz qux'123"foo" is interpreted as 1 argument because there are no un-escaped
353
+ # whitespace there. The argument would be interpreted as the string "foo barbaz qux123foo".
354
+ # This lets us escape ' characters by exiting the ' quoted string, injecting a "'" fragment and
355
+ # then resuming the ' quoted string again.
356
+ #
357
+ # In the process of defeating ruby, one must also defeat the helpfulness of powershell.
358
+ # When arguments come into this method, the standard PS rules for interpreting cmdlet arguments
359
+ # apply. When using & (call operator) and providing an array of arguments, powershell (verified
360
+ # on PS 4.0 on Windows Server 2012R2) will not evaluate them but (contrary to documentation),
361
+ # it will still marginally interpret them. The behavior of PS 5.0 seems to be different but
362
+ # ignore that for now. If any of the provided arguments has a space in it, powershell checks
363
+ # the first and last character to ensure that they are " characters (and that's all it checks).
364
+ # If they are not, it will blindly surround that argument with " characters. It won't do this
365
+ # operation if no space is present, even if other special characters are present. If it notices
366
+ # leading and trailing " characters, it won't actually check to see if there are other "
367
+ # characters in the string. Since PS 5.0 changes this behavior, we could consider using the --%
368
+ # "stop screwing up my arguments" operator, which is available since PS 3.0. When encountered
369
+ # --% indicates that the rest of line is to be sent literally... except if the parser encounters
370
+ # %FOO% cmd style environment variables. Because reasons. And there is no way to escape the
371
+ # % character in *any* waym shape or form.
372
+ # https://connect.microsoft.com/PowerShell/feedback/details/376207/executing-commands-which-require-quotes-and-variables-is-practically-impossible
373
+ #
374
+ # In case you think that you're either reading this incorrectly or that I'm full of shit, here
375
+ # are some examples. These use EchoArgs.exe from the PowerShell Community Extensions package.
376
+ # I have not included the argument parsing output from EchoArgs.exe to prevent confusing you with
377
+ # more details about MSVCRT's parsing algorithm.
378
+ #
379
+ # $x = "foo '' bar `"baz`""
380
+ # & EchoArgs @($x, $x)
381
+ # Command line:
382
+ # "C:\Program Files (x86)\PowerShell Community Extensions\Pscx3\Pscx\Apps\EchoArgs.exe" "foo '' bar "baz"" "foo '' bar "baz""
383
+ #
384
+ # $x = "abc'123'nospace`"lol`"!!!"
385
+ # & EchoArgs @($x, $x)
386
+ # Command line:
387
+ # "C:\Program Files (x86)\PowerShell Community Extensions\Pscx3\Pscx\Apps\EchoArgs.exe" abc'123'nospace"lol"!!! abc'123'nospace"lol"!!!
388
+ #
389
+ # $x = "`"`"Look ma! Tonnes of spaces! 'foo' 'bar'`"`""
390
+ # & EchoArgs @($x, $x)
391
+ # Command line:
392
+ # "C:\Program Files (x86)\PowerShell Community Extensions\Pscx3\Pscx\Apps\EchoArgs.exe" ""Look ma! Tonnes of spaces! 'foo' 'bar'"" ""Look ma! Tonnes of spaces! 'foo' 'bar'""
393
+ #
394
+ # Given all this, we can now device a strategy to work around all these immensely helpful, well
395
+ # documented and useful tools by looking at each incoming argument, escaping any ' characters
396
+ # with a '"'"' sequence, surrounding each argument with ' & joining them with a space separating
397
+ # them.
398
+ # There is another bug (https://bugs.ruby-lang.org/issues/11142) that causes ruby to mangle any
399
+ # "" two-character double quote sequence but since we always emit our strings inside ' except for
400
+ # ' characters, this should be ok. Just remember that an argument '' should get translated to
401
+ # ''"'"''"'"'' on the command line. If those intervening empty ''s are not present, the presence
402
+ # of "" will cause ruby to mangle that argument.
403
+ $transformedList = $argList | foreach { "'" + ( $_ -replace "'","'`"'`"'" ) + "'" }
404
+ $fortifiedArgString = $transformedList -join ' '
405
+
406
+ # Use the correct embedded ruby path. We'll be deployed at a path that looks like
407
+ # [C:\opscode or some other prefix]\chef\modules\chef
408
+ $ruby = Join-Path (Get-ScriptDirectory) "..\..\embedded\bin\ruby.exe"
409
+ $commandPath = Join-Path (Get-ScriptDirectory) "..\..\bin\$command"
410
+
411
+ Run-ExecutableAndWait $ruby """$ruby"" '$commandPath' $fortifiedArgString"
412
+ }
413
+
414
+
415
+ function chef-apply {
416
+ Run-RubyCommand 'chef-apply' $args
417
+ }
418
+
419
+ function chef-client {
420
+ Run-RubyCommand 'chef-client' $args
421
+ }
422
+
423
+ function chef-service-manager {
424
+ Run-RubyCommand 'chef-service-manager' $args
425
+ }
426
+
427
+ function chef-shell {
428
+ Run-RubyCommand 'chef-shell' $args
429
+ }
430
+
431
+ function chef-solo {
432
+ Run-RubyCommand 'chef-solo' $args
433
+ }
434
+
435
+ function chef-windows-service {
436
+ Run-RubyCommand 'chef-windows-service' $args
437
+ }
438
+
439
+ function knife {
440
+ Run-RubyCommand 'knife' $args
441
+ }
442
+
443
+ Export-ModuleMember -function chef-apply
444
+ Export-ModuleMember -function chef-client
445
+ Export-ModuleMember -function chef-service-manager
446
+ Export-ModuleMember -function chef-shell
447
+ Export-ModuleMember -function chef-solo
448
+ Export-ModuleMember -function chef-windows-service
449
+ Export-ModuleMember -function knife
450
+
451
+ # To debug this module, uncomment the line below
452
+ # Export-ModuleMember -function Run-RubyCommand
453
+
454
+ # Then run the following to reload the module. Use puts_argv as a helpful debug executable.
455
+ # Remove-Module chef
456
+ # Import-Module chef
457
+ # "puts ARGV" | Out-File C:\opscode\chef\bin\puts_args -Encoding ASCII
458
+ # Copy-Item C:\opscode\chef\bin\ohai.bat C:\opscode\chef\bin\puts_args.bat
459
+ # Run-RubyCommand puts_args 'Here' "are" some '"very interesting"' 'arguments[to]' "`"try out`""
@@ -124,11 +124,11 @@ class Chef
124
124
  end
125
125
 
126
126
  def self.get_cert_user
127
- Chef::Config[:auth_key_registry_type] == "user" ? store = "CurrentUser" : store = "LocalMachine"
127
+ Chef::Config[:auth_key_registry_type] == "user" ? "CurrentUser" : "LocalMachine"
128
128
  end
129
129
 
130
130
  def self.get_registry_user
131
- Chef::Config[:auth_key_registry_type] == "user" ? store = "HKEY_CURRENT_USER" : store = "HKEY_LOCAL_MACHINE"
131
+ Chef::Config[:auth_key_registry_type] == "user" ? "HKEY_CURRENT_USER" : "HKEY_LOCAL_MACHINE"
132
132
  end
133
133
 
134
134
  def self.check_certstore_for_key(client_name)
@@ -15,7 +15,7 @@
15
15
  # limitations under the License.
16
16
  #
17
17
 
18
- require "proxifier2"
18
+ require "proxifier"
19
19
  require "chef-config/mixin/fuzzy_hostname_matcher"
20
20
 
21
21
  class Chef
@@ -17,11 +17,14 @@
17
17
  #
18
18
 
19
19
  require "chef-utils" unless defined?(ChefUtils::CANARY)
20
+ require_relative "../mixin/powershell_exec"
20
21
 
21
22
  class Chef
22
23
  class Platform
23
24
 
24
25
  class << self
26
+ include Chef::Mixin::PowershellExec
27
+
25
28
  def windows?
26
29
  ChefUtils.windows?
27
30
  end
@@ -58,8 +61,7 @@ class Chef
58
61
  end
59
62
 
60
63
  def dsc_refresh_mode_disabled?(node)
61
- require_relative "../powershell"
62
- exec = Chef::PowerShell.new("Get-DscLocalConfigurationManager")
64
+ exec = powershell_exec!("Get-DscLocalConfigurationManager")
63
65
  exec.error!
64
66
  exec.result["RefreshMode"] == "Disabled"
65
67
  end
@@ -50,15 +50,17 @@ class Chef
50
50
  end
51
51
  ```
52
52
 
53
- **Specifying the type of a key to skip automatic type detection**
53
+ **Setting a value for specific user and hosts**
54
54
 
55
55
  ```ruby
56
- macos_userdefaults 'Finder expanded save dialogs' do
57
- key 'NSNavPanelExpandedStateForSaveMode'
58
- value 'TRUE'
59
- type 'bool'
56
+ macos_userdefaults 'Enable macOS firewall' do
57
+ key 'globalstate'
58
+ value 1
59
+ user 'jane'
60
+ host :current
60
61
  end
61
62
  ```
63
+
62
64
  DOC
63
65
 
64
66
  property :domain, String,
@@ -79,6 +81,7 @@ class Chef
79
81
 
80
82
  property :host, [String, Symbol],
81
83
  description: "Set either :current, :all or a hostname to set the user default at the host level.",
84
+ default: :all,
82
85
  desired_state: false,
83
86
  introduced: "16.3"
84
87
 
@@ -94,6 +97,7 @@ class Chef
94
97
 
95
98
  property :user, [String, Symbol],
96
99
  description: "The system user that the default will be applied to. Set :current for current user, :all for all users or pass a valid username",
100
+ default: :current,
97
101
  desired_state: false
98
102
 
99
103
  property :sudo, [TrueClass, FalseClass],