knife-windows 0.8.5 → 0.8.6.rc.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/.gitignore +4 -4
- data/.travis.yml +6 -6
- data/CHANGELOG.md +48 -48
- data/DOC_CHANGES.md +23 -23
- data/Gemfile +11 -11
- data/LICENSE +201 -201
- data/README.md +161 -161
- data/RELEASE_NOTES.md +26 -26
- data/Rakefile +16 -16
- data/features/knife_help.feature +20 -20
- data/features/support/env.rb +5 -5
- data/knife-windows.gemspec +26 -26
- data/lib/chef/knife/bootstrap/windows-chef-client-msi.erb +227 -227
- data/lib/chef/knife/bootstrap_windows_base.rb +222 -222
- data/lib/chef/knife/bootstrap_windows_ssh.rb +93 -93
- data/lib/chef/knife/bootstrap_windows_winrm.rb +102 -102
- data/lib/chef/knife/core/windows_bootstrap_context.rb +311 -307
- data/lib/chef/knife/windows_helper.rb +34 -34
- data/lib/chef/knife/winrm.rb +315 -315
- data/lib/chef/knife/winrm_base.rb +99 -99
- data/lib/knife-windows/path_helper.rb +157 -157
- data/lib/knife-windows/version.rb +6 -6
- data/spec/functional/bootstrap_download_spec.rb +122 -122
- data/spec/spec_helper.rb +61 -61
- data/spec/unit/knife/bootstrap_template_spec.rb +92 -92
- data/spec/unit/knife/bootstrap_windows_winrm_spec.rb +106 -106
- data/spec/unit/knife/core/windows_bootstrap_context_spec.rb +54 -54
- data/spec/unit/knife/winrm_spec.rb +219 -219
- metadata +28 -20
data/README.md
CHANGED
@@ -1,161 +1,161 @@
|
|
1
|
-
Knife Windows Plugin
|
2
|
-
====================
|
3
|
-
|
4
|
-
This plugin adds additional functionality to the Chef Knife CLI tool for
|
5
|
-
configuring/interacting with nodes running Microsoft Windows. The subcommands
|
6
|
-
should function on any system running Ruby 1.9.1+ but nodes being configured
|
7
|
-
via these subcommands require Windows Remote Management (WinRM) 1.0+.WinRM
|
8
|
-
allows you to call native objects in Windows. This includes, but is not
|
9
|
-
limited to, running batch scripts, powershell scripts and fetching WMI
|
10
|
-
variables. For more information on WinRM, please visit
|
11
|
-
[Microsoft's WinRM site](http://msdn.microsoft.com/en-us/library/aa384426(v=VS.85).aspx).
|
12
|
-
You will want to familiarize yourself with (certain key aspects) of WinRM
|
13
|
-
because you will be writing scripts / running commands with this tool to get
|
14
|
-
you from specific point A to specific point B.
|
15
|
-
|
16
|
-
WinRM is built into Windows 7 and Windows Server 2008+. It can also be easily installed on older version of Windows, including:
|
17
|
-
|
18
|
-
* Windows Server 2003
|
19
|
-
* Windows Vista
|
20
|
-
|
21
|
-
More information can be found on [Microsoft Support article 968930](http://support.microsoft.com/?kbid=968930).
|
22
|
-
|
23
|
-
## Subcommands
|
24
|
-
|
25
|
-
This plugin provides the following Knife subcommands. Specific command options can be found by invoking the subcommand with a `--help` flag
|
26
|
-
|
27
|
-
### knife winrm
|
28
|
-
|
29
|
-
The `winrm` subcommand allows you to invoke commands in parallel on a subset of the nodes in your infrastructure. The `winrm` subcommand uses the same syntax as the [search subcommand](http://wiki.opscode.com/display/chef/Search); you could could find the uptime of all your web servers using the command:
|
30
|
-
|
31
|
-
knife winrm "role:web" "net stats srv" -x Administrator -P 'super_secret_password'
|
32
|
-
|
33
|
-
Or force a chef run:
|
34
|
-
|
35
|
-
knife winrm 'ec2-50-xx-xx-124.compute-1.amazonaws.com' 'chef-client -c c:/chef/client.rb' -m -x Administrator -P 'super_secret_password'
|
36
|
-
ec2-50-xx-xx-124.compute-1.amazonaws.com [Fri, 04 Mar 2011 22:00:49 +0000] INFO: Starting Chef Run (Version 0.9.12)
|
37
|
-
ec2-50-xx-xx-124.compute-1.amazonaws.com [Fri, 04 Mar 2011 22:00:50 +0000] WARN: Node ip-0A502FFB has an empty run list.
|
38
|
-
ec2-50-xx-xx-124.compute-1.amazonaws.com [Fri, 04 Mar 2011 22:00:53 +0000] INFO: Chef Run complete in 4.383966 seconds
|
39
|
-
ec2-50-xx-xx-124.compute-1.amazonaws.com [Fri, 04 Mar 2011 22:00:53 +0000] INFO: cleaning the checksum cache
|
40
|
-
ec2-50-xx-xx-124.compute-1.amazonaws.com [Fri, 04 Mar 2011 22:00:53 +0000] INFO: Running report handlers
|
41
|
-
ec2-50-xx-xx-124.compute-1.amazonaws.com [Fri, 04 Mar 2011 22:00:53 +0000] INFO: Report handlers complete
|
42
|
-
|
43
|
-
This subcommand operates in a manner similar to [knife ssh](http://wiki.opscode.com/display/chef/Knife#Knife-SSHSubcommand)...just leveraging the WinRM protocol for communication. It also include's `knife ssh`'s "[interactive session mode](http://wiki.opscode.com/display/chef/Knife#Knife-InteractiveMode)"
|
44
|
-
|
45
|
-
### knife bootstrap windows winrm
|
46
|
-
|
47
|
-
Performs a Chef Bootstrap (via the WinRM protocol) on the target node. The goal of the bootstrap is to get Chef installed on the target system so it can run Chef Client with a Chef Server. The main assumption is a baseline OS installation exists. It is primarily intended for Chef Client systems that talk to a Chef server.
|
48
|
-
|
49
|
-
This subcommand operates in a manner similar to [knife bootstrap](http://wiki.opscode.com/display/chef/Knife+Bootstrap)...just leveraging the WinRM protocol for communication. An initial run_list for the node can also be passed to the subcommand. Example usage:
|
50
|
-
|
51
|
-
knife bootstrap windows winrm ec2-50-xx-xx-124.compute-1.amazonaws.com -r 'role[webserver],role[production]' -x Administrator -P 'super_secret_password'
|
52
|
-
|
53
|
-
### knife bootstrap windows ssh
|
54
|
-
|
55
|
-
Performs a Chef Bootstrap (via the SSH protocol) on the target node. The goal of the bootstrap is to get Chef installed on the target system so it can run Chef Client with a Chef Server. The main assumption is a baseline OS installation exists. It is primarily intended for Chef Client systems that talk to a Chef server.
|
56
|
-
|
57
|
-
This subcommand assumes the SSH session will use the Windows native cmd.exe command shell vs a bash shell through an emulated cygwin layer. Most popular Windows based SSHd daemons like [freeSSHd](http://www.freesshd.com/) and [WinSSHD](http://www.bitvise.com/winsshd) behave this way.
|
58
|
-
|
59
|
-
An initial run_list for the node can also be passed to the subcommand. Example usage:
|
60
|
-
|
61
|
-
knife bootstrap windows ssh ec2-50-xx-xx-124.compute-1.amazonaws.com -r 'role[webserver],role[production]' -x Administrator -i ~/.ssh/id_rsa
|
62
|
-
|
63
|
-
## BOOTSTRAP TEMPLATES:
|
64
|
-
|
65
|
-
This gem provides the bootstrap template `windows-chef-client-msi`.
|
66
|
-
|
67
|
-
### windows-chef-client-msi
|
68
|
-
|
69
|
-
This bootstrap template does the following:
|
70
|
-
|
71
|
-
* Installs the latest version of Chef (and all dependencies) using the `chef-client` msi.
|
72
|
-
* Writes the validation.pem per the local knife configuration.
|
73
|
-
* Writes a default config file for Chef (`C:\chef\client.rb`) using values from the `knife.rb`.
|
74
|
-
* Creates a JSON attributes file containing the specified run list and run Chef.
|
75
|
-
|
76
|
-
This is the default bootstrap template used by both the `windows bootstrap` subcommands.
|
77
|
-
|
78
|
-
## REQUIREMENTS/SETUP:
|
79
|
-
|
80
|
-
### Ruby
|
81
|
-
|
82
|
-
Ruby 1.9.1+ is needed.
|
83
|
-
|
84
|
-
### Chef Version
|
85
|
-
|
86
|
-
Knife plugins require >= Chef 0.10. More details about Knife plugins can be [found on the Chef wiki](http://wiki.opscode.com/display/chef/Knife+Plugins).
|
87
|
-
|
88
|
-
## Nodes
|
89
|
-
|
90
|
-
**NOTE**: Before any WinRM related knife subcommands will function correctly a node's WinRM installation must be configured correctly. The below settings should be added to your base server image (AMI) or passed in using some sort of user-data mechanism provided by your cloud provider.
|
91
|
-
|
92
|
-
A server running WinRM must also be configured properly to allow outside connections and the entire network path from the knife workstation to the server. The easiest way to accomplish this is to use [WinRM's quick configuration option](http://msdn.microsoft.com/en-us/library/aa384372(v=vs.85).aspx#quick_default_configuration):
|
93
|
-
|
94
|
-
winrm quickconfig -q
|
95
|
-
|
96
|
-
The Chef and Ohai gem installations (that occur during bootstrap) take more
|
97
|
-
memory than the default 150MB WinRM allocates per shell -- this can slow down
|
98
|
-
bootstrap. Optionally increase the memory limit to 300MB with the following command:
|
99
|
-
|
100
|
-
winrm set winrm/config/winrs @{MaxMemoryPerShellMB="300"}
|
101
|
-
|
102
|
-
Bootstrap commands can take longer than the WinRM default 60 seconds to
|
103
|
-
complete, optionally increase to 30 minutes if bootstrap terminates a command prematurely:
|
104
|
-
|
105
|
-
winrm set winrm/config @{MaxTimeoutms="1800000"}
|
106
|
-
|
107
|
-
WinRM supports both the HTTP and HTTPS transports and the following
|
108
|
-
authentication schemes: Kerberos, Digest, Certificate and Basic. The details
|
109
|
-
of these authentication transports are outside of the scope of this README but
|
110
|
-
details can be found on the
|
111
|
-
[WinRM configuration guide](http://msdn.microsoft.com/en-us/library/aa384372(v=vs.85).aspx).
|
112
|
-
Currently, this plugin support Kerberos and Basic authentication schemes on
|
113
|
-
all platform versions. The negotiate protocol which allows NTLM is fully
|
114
|
-
supported when `knife windows bootstrap` is executed on a Windows system; if
|
115
|
-
it is executed on a non-Windows system, certificate authentication or Kerberos
|
116
|
-
should be used instead via the `:kerberos_service` and related options of the subcommands.
|
117
|
-
|
118
|
-
**NOTE**: In order to use NTLM / Negotiate to authenticate as the user
|
119
|
-
specified by the `--winrm-user` (`-x`) option, you must include the user's
|
120
|
-
Windows domain when specifying the user name using the format `domain\user`
|
121
|
-
where the backslash ('`\`') character separates the user from the domain. If
|
122
|
-
an account local to the node is being used to access, `.` may be used as the domain:
|
123
|
-
|
124
|
-
knife bootstrap windows winrm web1.cloudapp.net -r 'server::web' -x 'proddomain\webuser' -P 'super_secret_password'
|
125
|
-
knife bootstrap windows winrm db1.cloudapp.net -r 'server::db' -x '.\localadmin' -P 'super_secret_password'
|
126
|
-
|
127
|
-
For development and testing purposes, unencrypted traffic with Basic authentication can make it easier to test connectivity:
|
128
|
-
|
129
|
-
winrm set winrm/config/service @{AllowUnencrypted="true"}
|
130
|
-
winrm set winrm/config/service/auth @{Basic="true"}
|
131
|
-
|
132
|
-
## Troubleshooting
|
133
|
-
|
134
|
-
* When I run the winrm command I get: "Error: Invalid use of command line. Type "winrm -?" for help."
|
135
|
-
You're running the winrm command from PowerShell and you need to put the key/value pair in single quotes. For example:
|
136
|
-
|
137
|
-
winrm set winrm/config/winrs '@{MaxMemoryPerShellMB="512"}'
|
138
|
-
|
139
|
-
## CONTRIBUTING:
|
140
|
-
|
141
|
-
Please file bugs against the KNIFE_WINDOWS project at https://github.com/opscode/knife-windows/issues.
|
142
|
-
|
143
|
-
More information on the contribution process for Opscode projects can be found in the [Chef Contributions document](http://docs.opscode.com/community_contributions.html).
|
144
|
-
|
145
|
-
# LICENSE:
|
146
|
-
|
147
|
-
Author:: Seth Chisamore (<schisamo@opscode.com>)
|
148
|
-
Copyright:: Copyright (c) 2014 Opscode, Inc.
|
149
|
-
License:: Apache License, Version 2.0
|
150
|
-
|
151
|
-
Licensed under the Apache License, Version 2.0 (the "License");
|
152
|
-
you may not use this file except in compliance with the License.
|
153
|
-
You may obtain a copy of the License at
|
154
|
-
|
155
|
-
http://www.apache.org/licenses/LICENSE-2.0
|
156
|
-
|
157
|
-
Unless required by applicable law or agreed to in writing, software
|
158
|
-
distributed under the License is distributed on an "AS IS" BASIS,
|
159
|
-
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
160
|
-
See the License for the specific language governing permissions and
|
161
|
-
limitations under the License.
|
1
|
+
Knife Windows Plugin
|
2
|
+
====================
|
3
|
+
|
4
|
+
This plugin adds additional functionality to the Chef Knife CLI tool for
|
5
|
+
configuring/interacting with nodes running Microsoft Windows. The subcommands
|
6
|
+
should function on any system running Ruby 1.9.1+ but nodes being configured
|
7
|
+
via these subcommands require Windows Remote Management (WinRM) 1.0+.WinRM
|
8
|
+
allows you to call native objects in Windows. This includes, but is not
|
9
|
+
limited to, running batch scripts, powershell scripts and fetching WMI
|
10
|
+
variables. For more information on WinRM, please visit
|
11
|
+
[Microsoft's WinRM site](http://msdn.microsoft.com/en-us/library/aa384426(v=VS.85).aspx).
|
12
|
+
You will want to familiarize yourself with (certain key aspects) of WinRM
|
13
|
+
because you will be writing scripts / running commands with this tool to get
|
14
|
+
you from specific point A to specific point B.
|
15
|
+
|
16
|
+
WinRM is built into Windows 7 and Windows Server 2008+. It can also be easily installed on older version of Windows, including:
|
17
|
+
|
18
|
+
* Windows Server 2003
|
19
|
+
* Windows Vista
|
20
|
+
|
21
|
+
More information can be found on [Microsoft Support article 968930](http://support.microsoft.com/?kbid=968930).
|
22
|
+
|
23
|
+
## Subcommands
|
24
|
+
|
25
|
+
This plugin provides the following Knife subcommands. Specific command options can be found by invoking the subcommand with a `--help` flag
|
26
|
+
|
27
|
+
### knife winrm
|
28
|
+
|
29
|
+
The `winrm` subcommand allows you to invoke commands in parallel on a subset of the nodes in your infrastructure. The `winrm` subcommand uses the same syntax as the [search subcommand](http://wiki.opscode.com/display/chef/Search); you could could find the uptime of all your web servers using the command:
|
30
|
+
|
31
|
+
knife winrm "role:web" "net stats srv" -x Administrator -P 'super_secret_password'
|
32
|
+
|
33
|
+
Or force a chef run:
|
34
|
+
|
35
|
+
knife winrm 'ec2-50-xx-xx-124.compute-1.amazonaws.com' 'chef-client -c c:/chef/client.rb' -m -x Administrator -P 'super_secret_password'
|
36
|
+
ec2-50-xx-xx-124.compute-1.amazonaws.com [Fri, 04 Mar 2011 22:00:49 +0000] INFO: Starting Chef Run (Version 0.9.12)
|
37
|
+
ec2-50-xx-xx-124.compute-1.amazonaws.com [Fri, 04 Mar 2011 22:00:50 +0000] WARN: Node ip-0A502FFB has an empty run list.
|
38
|
+
ec2-50-xx-xx-124.compute-1.amazonaws.com [Fri, 04 Mar 2011 22:00:53 +0000] INFO: Chef Run complete in 4.383966 seconds
|
39
|
+
ec2-50-xx-xx-124.compute-1.amazonaws.com [Fri, 04 Mar 2011 22:00:53 +0000] INFO: cleaning the checksum cache
|
40
|
+
ec2-50-xx-xx-124.compute-1.amazonaws.com [Fri, 04 Mar 2011 22:00:53 +0000] INFO: Running report handlers
|
41
|
+
ec2-50-xx-xx-124.compute-1.amazonaws.com [Fri, 04 Mar 2011 22:00:53 +0000] INFO: Report handlers complete
|
42
|
+
|
43
|
+
This subcommand operates in a manner similar to [knife ssh](http://wiki.opscode.com/display/chef/Knife#Knife-SSHSubcommand)...just leveraging the WinRM protocol for communication. It also include's `knife ssh`'s "[interactive session mode](http://wiki.opscode.com/display/chef/Knife#Knife-InteractiveMode)"
|
44
|
+
|
45
|
+
### knife bootstrap windows winrm
|
46
|
+
|
47
|
+
Performs a Chef Bootstrap (via the WinRM protocol) on the target node. The goal of the bootstrap is to get Chef installed on the target system so it can run Chef Client with a Chef Server. The main assumption is a baseline OS installation exists. It is primarily intended for Chef Client systems that talk to a Chef server.
|
48
|
+
|
49
|
+
This subcommand operates in a manner similar to [knife bootstrap](http://wiki.opscode.com/display/chef/Knife+Bootstrap)...just leveraging the WinRM protocol for communication. An initial run_list for the node can also be passed to the subcommand. Example usage:
|
50
|
+
|
51
|
+
knife bootstrap windows winrm ec2-50-xx-xx-124.compute-1.amazonaws.com -r 'role[webserver],role[production]' -x Administrator -P 'super_secret_password'
|
52
|
+
|
53
|
+
### knife bootstrap windows ssh
|
54
|
+
|
55
|
+
Performs a Chef Bootstrap (via the SSH protocol) on the target node. The goal of the bootstrap is to get Chef installed on the target system so it can run Chef Client with a Chef Server. The main assumption is a baseline OS installation exists. It is primarily intended for Chef Client systems that talk to a Chef server.
|
56
|
+
|
57
|
+
This subcommand assumes the SSH session will use the Windows native cmd.exe command shell vs a bash shell through an emulated cygwin layer. Most popular Windows based SSHd daemons like [freeSSHd](http://www.freesshd.com/) and [WinSSHD](http://www.bitvise.com/winsshd) behave this way.
|
58
|
+
|
59
|
+
An initial run_list for the node can also be passed to the subcommand. Example usage:
|
60
|
+
|
61
|
+
knife bootstrap windows ssh ec2-50-xx-xx-124.compute-1.amazonaws.com -r 'role[webserver],role[production]' -x Administrator -i ~/.ssh/id_rsa
|
62
|
+
|
63
|
+
## BOOTSTRAP TEMPLATES:
|
64
|
+
|
65
|
+
This gem provides the bootstrap template `windows-chef-client-msi`.
|
66
|
+
|
67
|
+
### windows-chef-client-msi
|
68
|
+
|
69
|
+
This bootstrap template does the following:
|
70
|
+
|
71
|
+
* Installs the latest version of Chef (and all dependencies) using the `chef-client` msi.
|
72
|
+
* Writes the validation.pem per the local knife configuration.
|
73
|
+
* Writes a default config file for Chef (`C:\chef\client.rb`) using values from the `knife.rb`.
|
74
|
+
* Creates a JSON attributes file containing the specified run list and run Chef.
|
75
|
+
|
76
|
+
This is the default bootstrap template used by both the `windows bootstrap` subcommands.
|
77
|
+
|
78
|
+
## REQUIREMENTS/SETUP:
|
79
|
+
|
80
|
+
### Ruby
|
81
|
+
|
82
|
+
Ruby 1.9.1+ is needed.
|
83
|
+
|
84
|
+
### Chef Version
|
85
|
+
|
86
|
+
Knife plugins require >= Chef 0.10. More details about Knife plugins can be [found on the Chef wiki](http://wiki.opscode.com/display/chef/Knife+Plugins).
|
87
|
+
|
88
|
+
## Nodes
|
89
|
+
|
90
|
+
**NOTE**: Before any WinRM related knife subcommands will function correctly a node's WinRM installation must be configured correctly. The below settings should be added to your base server image (AMI) or passed in using some sort of user-data mechanism provided by your cloud provider.
|
91
|
+
|
92
|
+
A server running WinRM must also be configured properly to allow outside connections and the entire network path from the knife workstation to the server. The easiest way to accomplish this is to use [WinRM's quick configuration option](http://msdn.microsoft.com/en-us/library/aa384372(v=vs.85).aspx#quick_default_configuration):
|
93
|
+
|
94
|
+
winrm quickconfig -q
|
95
|
+
|
96
|
+
The Chef and Ohai gem installations (that occur during bootstrap) take more
|
97
|
+
memory than the default 150MB WinRM allocates per shell -- this can slow down
|
98
|
+
bootstrap. Optionally increase the memory limit to 300MB with the following command:
|
99
|
+
|
100
|
+
winrm set winrm/config/winrs @{MaxMemoryPerShellMB="300"}
|
101
|
+
|
102
|
+
Bootstrap commands can take longer than the WinRM default 60 seconds to
|
103
|
+
complete, optionally increase to 30 minutes if bootstrap terminates a command prematurely:
|
104
|
+
|
105
|
+
winrm set winrm/config @{MaxTimeoutms="1800000"}
|
106
|
+
|
107
|
+
WinRM supports both the HTTP and HTTPS transports and the following
|
108
|
+
authentication schemes: Kerberos, Digest, Certificate and Basic. The details
|
109
|
+
of these authentication transports are outside of the scope of this README but
|
110
|
+
details can be found on the
|
111
|
+
[WinRM configuration guide](http://msdn.microsoft.com/en-us/library/aa384372(v=vs.85).aspx).
|
112
|
+
Currently, this plugin support Kerberos and Basic authentication schemes on
|
113
|
+
all platform versions. The negotiate protocol which allows NTLM is fully
|
114
|
+
supported when `knife windows bootstrap` is executed on a Windows system; if
|
115
|
+
it is executed on a non-Windows system, certificate authentication or Kerberos
|
116
|
+
should be used instead via the `:kerberos_service` and related options of the subcommands.
|
117
|
+
|
118
|
+
**NOTE**: In order to use NTLM / Negotiate to authenticate as the user
|
119
|
+
specified by the `--winrm-user` (`-x`) option, you must include the user's
|
120
|
+
Windows domain when specifying the user name using the format `domain\user`
|
121
|
+
where the backslash ('`\`') character separates the user from the domain. If
|
122
|
+
an account local to the node is being used to access, `.` may be used as the domain:
|
123
|
+
|
124
|
+
knife bootstrap windows winrm web1.cloudapp.net -r 'server::web' -x 'proddomain\webuser' -P 'super_secret_password'
|
125
|
+
knife bootstrap windows winrm db1.cloudapp.net -r 'server::db' -x '.\localadmin' -P 'super_secret_password'
|
126
|
+
|
127
|
+
For development and testing purposes, unencrypted traffic with Basic authentication can make it easier to test connectivity:
|
128
|
+
|
129
|
+
winrm set winrm/config/service @{AllowUnencrypted="true"}
|
130
|
+
winrm set winrm/config/service/auth @{Basic="true"}
|
131
|
+
|
132
|
+
## Troubleshooting
|
133
|
+
|
134
|
+
* When I run the winrm command I get: "Error: Invalid use of command line. Type "winrm -?" for help."
|
135
|
+
You're running the winrm command from PowerShell and you need to put the key/value pair in single quotes. For example:
|
136
|
+
|
137
|
+
winrm set winrm/config/winrs '@{MaxMemoryPerShellMB="512"}'
|
138
|
+
|
139
|
+
## CONTRIBUTING:
|
140
|
+
|
141
|
+
Please file bugs against the KNIFE_WINDOWS project at https://github.com/opscode/knife-windows/issues.
|
142
|
+
|
143
|
+
More information on the contribution process for Opscode projects can be found in the [Chef Contributions document](http://docs.opscode.com/community_contributions.html).
|
144
|
+
|
145
|
+
# LICENSE:
|
146
|
+
|
147
|
+
Author:: Seth Chisamore (<schisamo@opscode.com>)
|
148
|
+
Copyright:: Copyright (c) 2014 Opscode, Inc.
|
149
|
+
License:: Apache License, Version 2.0
|
150
|
+
|
151
|
+
Licensed under the Apache License, Version 2.0 (the "License");
|
152
|
+
you may not use this file except in compliance with the License.
|
153
|
+
You may obtain a copy of the License at
|
154
|
+
|
155
|
+
http://www.apache.org/licenses/LICENSE-2.0
|
156
|
+
|
157
|
+
Unless required by applicable law or agreed to in writing, software
|
158
|
+
distributed under the License is distributed on an "AS IS" BASIS,
|
159
|
+
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
160
|
+
See the License for the specific language governing permissions and
|
161
|
+
limitations under the License.
|
data/RELEASE_NOTES.md
CHANGED
@@ -1,26 +1,26 @@
|
|
1
|
-
<!---
|
2
|
-
This file is reset every time a new release is done. The contents of this file are for the currently unreleased version.
|
3
|
-
|
4
|
-
Example Note:
|
5
|
-
|
6
|
-
## Example Heading
|
7
|
-
Details about the thing that changed that needs to get included in the Release Notes in markdown.
|
8
|
-
-->
|
9
|
-
# knife-windows 0.8.4 release notes
|
10
|
-
This release of knife-windows addresses the lack of a way to configure the ssl settings
|
11
|
-
of a client when bootstrapped. knife-windows now mimics 'knife bootstrap' such that
|
12
|
-
new systems will have the trusted_certs_dir that is specified on the workstation copied
|
13
|
-
to the new node. Additional SSL related settings including verify_api_cert and
|
14
|
-
ssl_verify_mode will be set in the bootstrapped nodes client.rb to match the settings
|
15
|
-
in the workstations knife.rb.
|
16
|
-
|
17
|
-
## Features added in knife-windows 0.8.4
|
18
|
-
None.
|
19
|
-
|
20
|
-
## Issues fixed in knife-windows 0.8.4
|
21
|
-
[knife-windows #133](https://github.com/opscode/knife-windows/issues/133) Bootstrap failure -- unable to validate SSL chef server endpoints
|
22
|
-
|
23
|
-
## knife-windows on RubyGems and Github
|
24
|
-
https://rubygems.org/gems/knife-windows
|
25
|
-
https://github.com/chef/knife-windows
|
26
|
-
|
1
|
+
<!---
|
2
|
+
This file is reset every time a new release is done. The contents of this file are for the currently unreleased version.
|
3
|
+
|
4
|
+
Example Note:
|
5
|
+
|
6
|
+
## Example Heading
|
7
|
+
Details about the thing that changed that needs to get included in the Release Notes in markdown.
|
8
|
+
-->
|
9
|
+
# knife-windows 0.8.4 release notes
|
10
|
+
This release of knife-windows addresses the lack of a way to configure the ssl settings
|
11
|
+
of a client when bootstrapped. knife-windows now mimics 'knife bootstrap' such that
|
12
|
+
new systems will have the trusted_certs_dir that is specified on the workstation copied
|
13
|
+
to the new node. Additional SSL related settings including verify_api_cert and
|
14
|
+
ssl_verify_mode will be set in the bootstrapped nodes client.rb to match the settings
|
15
|
+
in the workstations knife.rb.
|
16
|
+
|
17
|
+
## Features added in knife-windows 0.8.4
|
18
|
+
None.
|
19
|
+
|
20
|
+
## Issues fixed in knife-windows 0.8.4
|
21
|
+
[knife-windows #133](https://github.com/opscode/knife-windows/issues/133) Bootstrap failure -- unable to validate SSL chef server endpoints
|
22
|
+
|
23
|
+
## knife-windows on RubyGems and Github
|
24
|
+
https://rubygems.org/gems/knife-windows
|
25
|
+
https://github.com/chef/knife-windows
|
26
|
+
|
data/Rakefile
CHANGED
@@ -1,16 +1,16 @@
|
|
1
|
-
require 'bundler'
|
2
|
-
Bundler::GemHelper.install_tasks
|
3
|
-
|
4
|
-
begin
|
5
|
-
require 'rspec/core/rake_task'
|
6
|
-
|
7
|
-
task :default => :spec
|
8
|
-
|
9
|
-
desc "Run all specs in spec directory"
|
10
|
-
RSpec::Core::RakeTask.new(:spec) do |t|
|
11
|
-
t.pattern = 'spec/**/*_spec.rb'
|
12
|
-
end
|
13
|
-
|
14
|
-
rescue LoadError
|
15
|
-
STDERR.puts "\n*** RSpec not available. (sudo) gem install rspec to run unit tests. ***\n\n"
|
16
|
-
end
|
1
|
+
require 'bundler'
|
2
|
+
Bundler::GemHelper.install_tasks
|
3
|
+
|
4
|
+
begin
|
5
|
+
require 'rspec/core/rake_task'
|
6
|
+
|
7
|
+
task :default => :spec
|
8
|
+
|
9
|
+
desc "Run all specs in spec directory"
|
10
|
+
RSpec::Core::RakeTask.new(:spec) do |t|
|
11
|
+
t.pattern = 'spec/**/*_spec.rb'
|
12
|
+
end
|
13
|
+
|
14
|
+
rescue LoadError
|
15
|
+
STDERR.puts "\n*** RSpec not available. (sudo) gem install rspec to run unit tests. ***\n\n"
|
16
|
+
end
|
data/features/knife_help.feature
CHANGED
@@ -1,20 +1,20 @@
|
|
1
|
-
Feature: Ensure that the help works as designed
|
2
|
-
In order to test the help via CLI
|
3
|
-
As an Operator
|
4
|
-
I want to run the CLI with different arguments
|
5
|
-
|
6
|
-
Scenario: Running the windows sub-command shows available commands
|
7
|
-
When I run `knife windows`
|
8
|
-
And the output should contain "Available windows subcommands: (for details, knife SUB-COMMAND --help)\n\n** WINDOWS COMMANDS **\nknife bootstrap windows winrm FQDN (options)\nknife bootstrap windows ssh FQDN (options)\nknife winrm QUERY COMMAND (options)"
|
9
|
-
|
10
|
-
Scenario: Running the windows sub-command shows available commands
|
11
|
-
When I run `knife windows --help`
|
12
|
-
And the output should contain "Available windows subcommands: (for details, knife SUB-COMMAND --help)\n\n** WINDOWS COMMANDS **\nknife bootstrap windows winrm FQDN (options)\nknife bootstrap windows ssh FQDN (options)\nknife winrm QUERY COMMAND (options)"
|
13
|
-
|
14
|
-
Scenario: Running the windows sub-command shows available commands
|
15
|
-
When I run `knife windows help`
|
16
|
-
And the output should contain "Available windows subcommands: (for details, knife SUB-COMMAND --help)\n\n** WINDOWS COMMANDS **\nknife bootstrap windows winrm FQDN (options)\nknife bootstrap windows ssh FQDN (options)\nknife winrm QUERY COMMAND (options)"
|
17
|
-
|
18
|
-
Scenario: Running the knife command shows available windows command"
|
19
|
-
When I run `knife`
|
20
|
-
And the output should contain "** WINDOWS COMMANDS **\nknife bootstrap windows winrm FQDN (options)\nknife bootstrap windows ssh FQDN (options)\nknife winrm QUERY COMMAND (options)"
|
1
|
+
Feature: Ensure that the help works as designed
|
2
|
+
In order to test the help via CLI
|
3
|
+
As an Operator
|
4
|
+
I want to run the CLI with different arguments
|
5
|
+
|
6
|
+
Scenario: Running the windows sub-command shows available commands
|
7
|
+
When I run `knife windows`
|
8
|
+
And the output should contain "Available windows subcommands: (for details, knife SUB-COMMAND --help)\n\n** WINDOWS COMMANDS **\nknife bootstrap windows winrm FQDN (options)\nknife bootstrap windows ssh FQDN (options)\nknife winrm QUERY COMMAND (options)"
|
9
|
+
|
10
|
+
Scenario: Running the windows sub-command shows available commands
|
11
|
+
When I run `knife windows --help`
|
12
|
+
And the output should contain "Available windows subcommands: (for details, knife SUB-COMMAND --help)\n\n** WINDOWS COMMANDS **\nknife bootstrap windows winrm FQDN (options)\nknife bootstrap windows ssh FQDN (options)\nknife winrm QUERY COMMAND (options)"
|
13
|
+
|
14
|
+
Scenario: Running the windows sub-command shows available commands
|
15
|
+
When I run `knife windows help`
|
16
|
+
And the output should contain "Available windows subcommands: (for details, knife SUB-COMMAND --help)\n\n** WINDOWS COMMANDS **\nknife bootstrap windows winrm FQDN (options)\nknife bootstrap windows ssh FQDN (options)\nknife winrm QUERY COMMAND (options)"
|
17
|
+
|
18
|
+
Scenario: Running the knife command shows available windows command"
|
19
|
+
When I run `knife`
|
20
|
+
And the output should contain "** WINDOWS COMMANDS **\nknife bootstrap windows winrm FQDN (options)\nknife bootstrap windows ssh FQDN (options)\nknife winrm QUERY COMMAND (options)"
|