class Chef::Client
Chef::Client
¶ ↑
The main object in a Chef
run. Preps a Chef::Node
and Chef::RunContext
, syncs cookbooks if necessary, and triggers convergence.
Constants
- CERT_SYSTEM_STORE_CURRENT_USER
- CERT_SYSTEM_STORE_LOCAL_MACHINE
adding these certstore 65536 == 0x00010000 == CurrentUser certstore 131072 == 0x00020000 == LocalMachine Reference: github.com/chef/win32-certstore/blob/main/lib/win32/certstore/mixin/crypto.rb#L90
- CERT_SYSTEM_STORE_SERVICES
- CERT_SYSTEM_STORE_USERS
- CRYPT_EXPORTABLE
- STDERR_FD
IO stream that will be used as ‘STDERR’ for formatters.
Formatters
are configured during ‘initialize`, so this provides a convenience for setting alternative IO stream during tests.@api private
- STDOUT_FD
IO stream that will be used as ‘STDOUT’ for formatters.
Formatters
are configured during ‘initialize`, so this provides a convenience for setting alternative IO stream during tests.@api private
Attributes
The event dispatcher for the Chef
run, including any configured output formatters and event loggers.
@return [EventDispatch::Dispatcher]
@see Chef::Formatters
@see Chef::Config#formatters @see Chef::Config#stdout @see Chef::Config#stderr @see Chef::Config#force_logger @see Chef::Config#force_formatter TODO add stdout, stderr, and default formatters to Chef::Config
so the defaults aren’t calculated here. Remove force_logger and force_formatter from this code. @see Chef::EventLoggers
@see Chef::Config#disable_event_logger @see Chef::Config#event_loggers @see Chef::Config#event_handlers
Extra node attributes that were applied to the node.
@return [Hash]
The ohai system used by this client.
@return [Ohai::System]
The run context of the Chef
run.
@return [Chef::RunContext]
The status of the Chef
run.
@return [Chef::RunStatus]
The runner used to converge.
@return [Chef::Runner]
Public Class Methods
Clears all listeners for client run status events.
Primarily for testing purposes.
@api private
# File lib/chef/client.rb, line 969 def clear_notifications @run_start_notifications = nil @run_completed_successfully_notifications = nil @run_failed_notifications = nil end
# File lib/chef/client.rb, line 697 def self.generate_pfx_package(cert_name, date) require "openssl" unless defined?(OpenSSL) key = OpenSSL::PKey::RSA.new(2048) public_key = key.public_key subject = "CN=#{cert_name}" cert = OpenSSL::X509::Certificate.new cert.subject = cert.issuer = OpenSSL::X509::Name.parse(subject) cert.not_before = Time.now cert.not_after = Time.parse(date) cert.public_key = public_key cert.serial = 0x0 cert.version = 2 ef = OpenSSL::X509::ExtensionFactory.new ef.subject_certificate = cert ef.issuer_certificate = cert cert.extensions = [ ef.create_extension("subjectKeyIdentifier", "hash"), ef.create_extension("keyUsage", "digitalSignature,keyEncipherment", true), ] cert.add_extension(ef.create_ext_from_string("extendedKeyUsage=critical,serverAuth,clientAuth")) cert.sign key, OpenSSL::Digest.new("SHA256") password = ::Chef::HTTP::Authenticator.get_cert_password pfx = OpenSSL::PKCS12.create(password, subject, key, cert) pfx end
# File lib/chef/client.rb, line 824 def self.import_pfx_to_store(new_pfx) password = ::Chef::HTTP::Authenticator.get_cert_password require "win32-certstore" tempfile = Tempfile.new("#{Chef::Config[:node_name]}.pfx") File.open(tempfile, "wb") { |f| f.print new_pfx.to_der } # Need to determine where to store the key if Chef::Config[:auth_key_registry_type] == "user" win32certstore = ::Win32::Certstore.open("MY", store_location: CERT_SYSTEM_STORE_CURRENT_USER) else win32certstore = ::Win32::Certstore.open("MY") end win32certstore.add_pfx(tempfile, password, CRYPT_EXPORTABLE) tempfile.unlink end
Creates a new Chef::Client
.
@param json_attribs
[Hash] Node
attributes to layer into the node when it is
fetched.
@param args [Hash] Options: @option args [Array<RunList::RunListItem>] :override_runlist A runlist to
use instead of the node's embedded run list.
@option args [Array<String>] :specific_recipes A list of recipe file paths
to load after the run list has been loaded.
# File lib/chef/client.rb, line 168 def initialize(json_attribs = nil, args = {}) @json_attribs = json_attribs || {} @logger = args.delete(:logger) || Chef::Log.with_child @ohai = Ohai::System.new(logger: logger) event_handlers = configure_formatters + configure_event_loggers event_handlers += Array(Chef::Config[:event_handlers]) @events = EventDispatch::Dispatcher.new(*event_handlers) # @todo it seems like a bad idea to be deletin' other peoples' hashes. @override_runlist = args.delete(:override_runlist) @specific_recipes = args.delete(:specific_recipes) @run_status = Chef::RunStatus.new(nil, events) if new_runlist = args.delete(:runlist) @json_attribs["run_list"] = new_runlist end end
Listeners to be run when the client run completes successfully.
@return [Array<Proc>]
@api private
# File lib/chef/client.rb, line 997 def run_completed_successfully_notifications @run_completed_successfully_notifications ||= [] end
Listeners to be run when the client run fails.
@return [Array<Proc>]
@api private
# File lib/chef/client.rb, line 1008 def run_failed_notifications @run_failed_notifications ||= [] end
Listeners to be run when the client run starts.
@return [Array<Proc>]
@api private
# File lib/chef/client.rb, line 986 def run_start_notifications @run_start_notifications ||= [] end
# File lib/chef/client.rb, line 732 def self.update_key_and_register(cert_name, expiring_cert = nil) # Chef client and node objects exist on Chef Server already # Create a new public/private keypair in secure storage # and register the new public cert with Chef Server require "time" unless defined?(Time) autoload :URI, "uri" node = Chef::Config[:node_name] end_date = Time.new + (3600 * 24 * 90) end_date = end_date.utc.iso8601 new_cert_name = Time.now.utc.iso8601 payload = { name: new_cert_name, clientname: node, public_key: "", expiration_date: end_date, } new_pfx = generate_pfx_package(cert_name, end_date) payload[:public_key] = new_pfx.certificate.public_key.to_pem base_url = "#{Chef::Config[:chef_server_url]}" @tmpdir = Dir.mktmpdir file_path = File.join(@tmpdir, "#{node}.pem") # The pfx files expire every 90 days. # We check them in /http/authenticator to see if they are expiring when we extract the private key # If they are, we come here to update Chef Server with a new public key if expiring_cert File.open(file_path, "w") { |f| f.write expiring_cert.key.to_pem } signing_cert = file_path client = Chef::ServerAPI.new(base_url, client_name: Chef::Config[:node_name], signing_key_filename: signing_cert ) File.delete(file_path) else client = Chef::ServerAPI.new(base_url, client_name: Chef::Config[:node_name], signing_key_filename: Chef::Config[:client_key] ) end # Get the list of keys for this client # Then add the new key we just created # Then we delete the old one. cert_list = client.get(base_url + "/clients/#{node}/keys") client.post(base_url + "/clients/#{node}/keys", payload) # We want to remove the old key for various reasons # In the case where more than 1 certificate is returned we assume # there is some special condition applied to the client so we won't delete the old # certificates if cert_list.count < 2 cert_hash = cert_list.reduce({}, :merge!) old_cert_name = cert_hash["name"] new_key = new_pfx.key.to_pem File.open(file_path, "w") { |f| f.write new_key } client = Chef::ServerAPI.new(base_url, client_name: Chef::Config[:node_name], signing_key_filename: file_path) client.delete(base_url + "/clients/#{node}/keys/#{old_cert_name}") File.delete(file_path) end import_pfx_to_store(new_pfx) end
Add a listener for the ‘client run success’ event.
@param notification_block The callback (takes |run_status| parameter). @yieldparam [Chef::RunStatus] run_status
The run status.
# File lib/chef/client.rb, line 948 def when_run_completes_successfully(¬ification_block) run_completed_successfully_notifications << notification_block end
Add a listener for the ‘client run failed’ event.
@param notification_block The callback (takes |run_status| parameter). @yieldparam [Chef::RunStatus] run_status
The run status.
# File lib/chef/client.rb, line 958 def when_run_fails(¬ification_block) run_failed_notifications << notification_block end
Add a listener for the ‘client run started’ event.
@param notification_block The callback (takes |run_status| parameter). @yieldparam [Chef::RunStatus] run_status
The run status.
# File lib/chef/client.rb, line 938 def when_run_starts(¬ification_block) run_start_notifications << notification_block end
Public Instance Methods
Mutates the ‘node` object to prepare it for the chef run.
@return [Chef::Node] The updated node object
@see Chef::PolicyBuilder#build_node
@api private
# File lib/chef/client.rb, line 466 def build_node policy_builder.build_node run_status.node = node node end
In the brave new world of No Certs On Disk, we want to put the pem file into Keychain or the Certstore But is it already there? We’re solving the multi-user scenario where both a system/admin user can run on the box but also someone without admin rights can also run correctly locally.
# File lib/chef/client.rb, line 683 def check_certstore_for_key(cert_name) require "win32-certstore" if Chef::Config[:auth_key_registry_type] == "user" win32certstore = ::Win32::Certstore.open("MY", store_location: CERT_SYSTEM_STORE_CURRENT_USER) else win32certstore = ::Win32::Certstore.open("MY") end win32certstore.search("#{cert_name}") end
@api private
# File lib/chef/client.rb, line 365 def configure_event_loggers if Chef::Config.disable_event_logger [] else Chef::Config.event_loggers.map do |evt_logger| case evt_logger when Symbol Chef::EventLoggers.new(evt_logger) when Class evt_logger.new else end end end end
@api private
# File lib/chef/client.rb, line 338 def configure_formatters formatters_for_run.map do |formatter_name, output_path| if output_path.nil? Chef::Formatters.new(formatter_name, STDOUT_FD, STDERR_FD) elsif output_path.is_a?(String) io = File.open(output_path, "a+") io.sync = true Chef::Formatters.new(formatter_name, io, io) end end end
Converges all compiled resources.
Fires the converge_start, converge_complete and converge_failed events.
If the exception ‘:end_client_run_early` is thrown during convergence, it does not mark the run complete or failed, and returns `nil`
@param run_context
The run context.
@raise Any converge exception
@see Chef::Runner#converge
@see Chef::EventDispatch#converge_start @see Chef::EventDispatch#converge_complete @see Chef::EventDispatch#converge_failed
@api private
# File lib/chef/client.rb, line 858 def converge(run_context) catch(:end_client_run_early) do events.converge_start(run_context) logger.debug("Converging node #{node_name}") @runner = Chef::Runner.new(run_context) @runner.converge events.converge_complete rescue Exception => e events.converge_failed(e) raise e end end
Converge the node via and then save it if successful.
If converge() raises it is important that save_updated_node
is bypassed.
@param run_context
[Chef::RunContext] The run context. @raise Any converge or node save exception
@api private
# File lib/chef/client.rb, line 882 def converge_and_save(run_context) converge(run_context) save_updated_node end
# File lib/chef/client.rb, line 792 def create_new_key_and_register(cert_name) require "time" unless defined?(Time) autoload :URI, "uri" node = Chef::Config[:node_name] d = Time.now if d.month == 10 || d.month == 11 || d.month == 12 end_date = Time.new(d.year + 1, d.month - 9, d.day, d.hour, d.min, d.sec).utc.iso8601 else end_date = Time.new(d.year, d.month + 3, d.day, d.hour, d.min, d.sec).utc.iso8601 end payload = { name: node, clientname: node, public_key: "", expiration_date: end_date, } new_pfx = generate_pfx_package(cert_name, end_date) payload[:public_key] = new_pfx.certificate.public_key.to_pem base_url = "#{Chef::Config[:chef_server_url]}" client = Chef::ServerAPI.new(base_url, client_name: Chef::Config[:validation_client_name], signing_key_filename: Chef::Config[:validation_key]) client.post(base_url + "/clients", payload) Chef::Log.trace("Updated client data: #{client.inspect}") import_pfx_to_store(new_pfx) end
Check if the user has Administrator privileges on windows.
Throws an error if the user is not an admin, and ‘Chef::Config.fatal_windows_admin_check` is true.
@raise [Chef::Exceptions::WindowsNotAdmin] If the user is not an admin.
@see Chef::platform#windows? @see Chef::Config#fatal_windows_admin_check
@api private
# File lib/chef/client.rb, line 911 def do_windows_admin_check if ChefUtils.windows? logger.trace("Checking for administrator privileges....") if !has_admin_privileges? message = "#{ChefUtils::Dist::Infra::CLIENT} doesn't have administrator privileges on node #{node_name}." if Chef::Config[:fatal_windows_admin_check] logger.fatal(message) logger.fatal("fatal_windows_admin_check is set to TRUE.") raise Chef::Exceptions::WindowsNotAdmin, message else logger.warn("#{message} This might cause unexpected resource failures.") end else logger.trace("#{ChefUtils::Dist::Infra::CLIENT} has administrator privileges on node #{node_name}.") end end end
Expands the run list.
@return [Chef::RunListExpansion] The expanded run list.
@see Chef::PolicyBuilder#expand_run_list
# File lib/chef/client.rb, line 894 def expanded_run_list policy_builder.expand_run_list end
@api private
# File lib/chef/client.rb, line 351 def formatters_for_run return Chef::Config.formatters unless Chef::Config.formatters.empty? [ Chef::Config[:log_location] ].flatten.map do |log_location| log_location = nil if log_location == STDOUT if !Chef::Config[:force_logger] || Chef::Config[:force_formatter] [:doc, log_location] else [:null] end end end
# File lib/chef/client.rb, line 693 def generate_pfx_package(cert_name, date) self.class.generate_pfx_package(cert_name, date) end
# File lib/chef/client.rb, line 820 def import_pfx_to_store(new_pfx) self.class.import_pfx_to_store(new_pfx) end
Instantiates a Chef::Node
object, possibly loading the node’s prior state when using chef-client. Sets Chef.node
to the new node.
@return [Chef::Node] The node object for this Chef
run
@see Chef::PolicyBuilder#load_node
@api private
# File lib/chef/client.rb, line 450 def load_node policy_builder.load_node run_status.node = policy_builder.node Chef.set_node(policy_builder.node) node end
Adds a required recipe as specified by the Chef
Server
@return The modified run context
@api private
TODO: @rest doesn’t appear to be used anywhere outside of client.register except for here. If it’s common practice to create your own rest client, perhaps we should do that here but it seems more appropriate to reuse one that we know is already created. for ease of testing, we’ll pass the existing rest client in as a parameter
# File lib/chef/client.rb, line 514 def load_required_recipe(rest, run_context) required_recipe_contents = rest.get("required_recipe") logger.info("Required Recipe found, loading it") Chef::FileCache.store("required_recipe", required_recipe_contents) required_recipe_file = Chef::FileCache.load("required_recipe", false) # TODO: add integration tests with resource reporting turned on # (presumably requires changes to chef-zero) # # Chef::Recipe.new takes a cookbook name and a recipe name along # with the run context. These names are eventually used in the # resource reporter, and if the cookbook name cannot be found in the # cookbook collection then we will fail with an exception. Cases where # we currently also fail: # - specific recipes # - chef-apply would fail if resource reporting was enabled # recipe = Chef::Recipe.new(nil, nil, run_context) recipe.from_file(required_recipe_file) run_context rescue Net::HTTPClientException => e case e.response when Net::HTTPNotFound logger.trace("Required Recipe not configured on the server, skipping it") else raise end end
The node represented by this client.
@return [Chef::Node]
# File lib/chef/client.rb, line 102 def node run_status.node end
# File lib/chef/client.rb, line 106 def node=(value) run_status.node = value end
Figure out the node name we are working with.
It tries these, in order:
@raise [Chef::Exceptions::CannotDetermineNodeName] If the node name is not
set and cannot be determined via ohai.
@see Chef::Config#node_name
@api private
# File lib/chef/client.rb, line 617 def node_name name = Chef::Config[:node_name] || ohai[:fqdn] || ohai[:machinename] || ohai[:hostname] Chef::Config[:node_name] = name raise Chef::Exceptions::CannotDetermineNodeName unless name name end
The PolicyBuilder
strategy for figuring out run list and cookbooks.
@return [Chef::PolicyBuilder::Policyfile, Chef::PolicyBuilder::ExpandNodeObject
]
@api private
# File lib/chef/client.rb, line 550 def policy_builder @policy_builder ||= Chef::PolicyBuilder::Dynamic.new(node_name, ohai.data, json_attribs, override_runlist, events) end
Determine our private key and set up the connection to the Chef
server.
Skips registration and fires the ‘skipping_registration` event if Chef::Config.client_key is unspecified or already exists.
If Chef::Config.client_key does not exist, we register the client with the Chef
server and fire the registration_start and registration_completed events.
@return [Chef::ServerAPI] The server connection object.
@see Chef::Config#chef_server_url @see Chef::Config#client_key @see Chef::ApiClient::Registration#run
@see Chef::EventDispatcher#skipping_registration @see Chef::EventDispatcher#registration_start @see Chef::EventDispatcher#registration_completed @see Chef::EventDispatcher#registration_failed
@api private
# File lib/chef/client.rb, line 647 def register(client_name = node_name, config = Chef::Config) if !config[:client_key] events.skipping_registration(client_name, config) logger.trace("Client key is unspecified - skipping registration") elsif ::Chef::Config[:migrate_key_to_keystore] == true && ChefUtils.windows? cert_name = "chef-#{client_name}" result = check_certstore_for_key(cert_name) if result.rassoc("#{cert_name}") logger.trace("Client key #{config[:client_key]} is present in Certificate Store - skipping registration") else create_new_key_and_register(cert_name) logger.trace("New client keys created in the Certificate Store - skipping registration") end events.skipping_registration(client_name, config) elsif File.exist?(config[:client_key]) events.skipping_registration(client_name, config) logger.trace("Client key #{config[:client_key]} is present - skipping registration") else events.registration_start(node_name, config) logger.info("Client key #{config[:client_key]} is not present - registering") Chef::ApiClient::Registration.new(node_name, config[:client_key]).run events.registration_completed end rescue Exception => e # TODO this should probably only ever fire if we *started* registration. # Move it to the block above. # TODO: munge exception so a semantic failure message can be given to the # user events.registration_failed(client_name, e, config) raise end
Standard rest object for talking to the Chef
Server
FIXME: Can we drop this and only use the rest_clean
object? Did I add rest_clean
only out of some cant-break-a-minor-version paranoia?
@api private
# File lib/chef/client.rb, line 387 def rest @rest ||= Chef::ServerAPI.new(Chef::Config[:chef_server_url], client_name: node_name, signing_key_filename: Chef::Config[:client_key]) end
A rest object with validate_utf8 set to false. This will not throw exceptions on non-UTF8 strings in JSON but will sanitize them so that e.g. POSTs will never fail. Cannot be configured on a request-by-request basis, so we carry around another rest object for it.
@api private
# File lib/chef/client.rb, line 398 def rest_clean @rest_clean ||= Chef::ServerAPI.new(Chef::Config[:chef_server_url], client_name: node_name, signing_key_filename: Chef::Config[:client_key], validate_utf8: false) end
Do a full run for this Chef::Client
.
Locks the run while doing its job.
Fires run_start before doing anything and fires run_completed or run_failed
when finished. Also notifies client listeners of run_started
at the beginning of Compile, and run_completed_successfully
or run_failed
when all is complete.
Phase 1: Setup
Gets information about the system and the run we are doing.
-
Run ohai to collect system information.
-
Register / connect to the
Chef
server (unless in solo mode). -
Retrieve the node (or create a new one).
-
Merge in
json_attribs
, Chef::Config.environment, and override_run_list.
@see run_ohai
@see load_node
@see build_node
@see Chef::Config#lockfile @see Chef::RunLock#acquire
Phase 2: Compile
Decides what we plan to converge by compiling recipes.
-
Sync required cookbooks to the local cache.
-
Load libraries from all cookbooks.
-
Load attributes from all cookbooks.
-
Load LWRPs from all cookbooks.
-
Load resource definitions from all cookbooks.
-
Load recipes in the run list.
-
Load recipes from the command line.
@see setup_run_context
Syncs and compiles cookbooks. @see Chef::CookbookCompiler#compile
Phase 3: Converge
Brings the system up to date.
-
Converge the resources built from recipes in Phase 2.
-
Save the node.
-
Reboot if we were asked to.
@see converge_and_save
@see Chef::Runner
@return Always returns true.
# File lib/chef/client.rb, line 241 def run start_profiling runlock = RunLock.new(Chef::Config.lockfile) # TODO feels like acquire should have its own block arg for this runlock.acquire # don't add code that may fail before entering this section to be sure to release lock begin runlock.save_pid events.register(Chef::DataCollector::Reporter.new(events)) events.register(Chef::ActionCollection.new(events)) events.register(Chef::Compliance::Runner.new) run_status.run_id = request_id = Chef::RequestID.instance.request_id @run_context = Chef::RunContext.new(nil, nil, events) run_status.run_context = run_context events.run_start(Chef::VERSION, run_status) logger.info("*** #{ChefUtils::Dist::Infra::PRODUCT} #{Chef::VERSION} ***") logger.info("Platform: #{RUBY_PLATFORM}") logger.info "#{ChefUtils::Dist::Infra::CLIENT.capitalize} pid: #{Process.pid}" logger.info "Targeting node: #{Chef::Config.target_mode.host}" if Chef::Config.target_mode? logger.debug("#{ChefUtils::Dist::Infra::CLIENT.capitalize} request_id: #{request_id}") logger.warn("`enforce_path_sanity` is deprecated, please use `enforce_default_paths` instead!") if Chef::Config[:enforce_path_sanity] ENV["PATH"] = ChefUtils::DSL::DefaultPaths.default_paths if Chef::Config[:enforce_default_paths] || Chef::Config[:enforce_path_sanity] run_ohai unless Chef::Config[:solo_legacy_mode] register # create and save the rest objects in the run_context run_context.rest = rest run_context.rest_clean = rest_clean events.register(Chef::ResourceReporter.new(rest_clean)) end load_node build_node run_status.start_clock logger.info("Starting #{ChefUtils::Dist::Infra::PRODUCT} Run for #{node.name}") run_started do_windows_admin_check Chef.resource_handler_map.lock! Chef.provider_handler_map.lock! setup_run_context setup_targetmode if Chef::Config.target_mode? load_required_recipe(@rest, run_context) unless Chef::Config[:solo_legacy_mode] converge_and_save(run_context) run_status.stop_clock logger.info("#{ChefUtils::Dist::Infra::PRODUCT} Run complete in #{run_status.elapsed_time} seconds") run_completed_successfully events.run_completed(node, run_status) # keep this inside the main loop to get exception backtraces end_profiling # rebooting has to be the last thing we do, no exceptions. Chef::Platform::Rebooter.reboot_if_needed!(node) rescue Exception => run_error # CHEF-3336: Send the error first in case something goes wrong below and we don't know why logger.trace("Re-raising exception: #{run_error.class} - #{run_error.message}\n#{run_error.backtrace.join("\n ")}") # If we failed really early, we may not have a run_status yet. Too early for these to be of much use. if run_status run_status.stop_clock run_status.exception = run_error run_failed end events.run_failed(run_error, run_status) Chef::Application.debug_stacktrace(run_error) raise run_error ensure Chef::RequestID.instance.reset_request_id @run_status = nil runlock.release end true end
Callback to fire notifications that the run completed successfully
@api private
# File lib/chef/client.rb, line 421 def run_completed_successfully success_handlers = self.class.run_completed_successfully_notifications success_handlers.each do |notification| notification.call(run_status) end end
Callback to fire notifications that the Chef
run failed
@api private
# File lib/chef/client.rb, line 433 def run_failed failure_handlers = self.class.run_failed_notifications failure_handlers.each do |notification| notification.call(run_status) end end
Run ohai plugins. Runs all ohai plugins unless minimal_ohai is specified.
Sends the ohai_completed event when finished.
@see Chef::EventDispatcher# @see Chef::Config#minimal_ohai
@api private
# File lib/chef/client.rb, line 594 def run_ohai filter = Chef::Config[:minimal_ohai] ? %w{fqdn machinename hostname platform platform_version ohai_time os os_version init_package} : nil ohai.transport_connection = transport_connection if Chef::Config.target_mode? ohai.all_plugins(filter) events.ohai_completed(node) end
Callback to fire notifications that the Chef
run is starting
@api private
# File lib/chef/client.rb, line 409 def run_started self.class.run_start_notifications.each do |notification| notification.call(run_status) end events.run_started(run_status) end
Save the updated node to Chef
.
Does not save if we are in solo mode or using override_runlist.
@see Chef::Node#save
@see Chef::Config#solo
@api private
# File lib/chef/client.rb, line 564 def save_updated_node if Chef::Config[:solo_legacy_mode] # nothing to do elsif policy_builder.temporary_policy? logger.warn("Skipping final node save because override_runlist was given") else logger.debug("Saving the current state of node #{node_name}") node.save end end
Sets up the run context.
@see Chef::PolicyBuilder#setup_run_context
@return The newly set up run context
@api private
# File lib/chef/client.rb, line 493 def setup_run_context @run_context = policy_builder.setup_run_context(specific_recipes, run_context) assert_cookbook_path_not_empty(run_context) run_status.run_context = run_context # backcompat for chefspec run_context end
Setup conditions for Target Mode.
@api private
# File lib/chef/client.rb, line 580 def setup_targetmode TargetIO::FileUtils.mkdir_p(Chef::Config[:file_cache_path]) end
Sync cookbooks to local cache.
TODO this appears to be unused.
@see Chef::PolicyBuilder#sync_cookbooks
@api private
# File lib/chef/client.rb, line 481 def sync_cookbooks policy_builder.sync_cookbooks end
# File lib/chef/client.rb, line 728 def update_key_and_register(cert_name) self.class.update_key_and_register(cert_name) end
Private Instance Methods
# File lib/chef/client.rb, line 1074 def assert_cookbook_path_not_empty(run_context) if Chef::Config[:solo_legacy_mode] # Check for cookbooks in the path given # Chef::Config[:cookbook_path] can be a string or an array # if it's an array, go through it and check each one, raise error at the last one if no files are found cookbook_paths = Array(Chef::Config[:cookbook_path]) logger.trace "Loading from cookbook_path: #{cookbook_paths.map { |path| File.expand_path(path) }.join(", ")}" if cookbook_paths.all? { |path| empty_directory?(path) } msg = "None of the cookbook paths set in Chef::Config[:cookbook_path], #{cookbook_paths.inspect}, contain any cookbooks" logger.fatal(msg) raise Chef::Exceptions::CookbookNotFound, msg end else logger.warn("Node #{node_name} has an empty run list.") if run_context.node.run_list.empty? end end
# File lib/chef/client.rb, line 1066 def empty_directory?(path) !File.exist?(path) || (Dir.entries(path).size <= 2) end
# File lib/chef/client.rb, line 1055 def end_profiling return unless Chef::Config[:profile_ruby] profiling_prereqs! path = Chef::FileCache.create_cache_path("graph_profile.out", false) File.open(path, "w+") do |file| RubyProf::GraphPrinter.new(RubyProf.stop).print(file, {}) end logger.warn("Ruby execution profile dumped to #{path}") end
# File lib/chef/client.rb, line 1091 def has_admin_privileges? require_relative "win32/security" Chef::ReservedNames::Win32::Security.has_admin_privileges? end
# File lib/chef/client.rb, line 1070 def is_last_element?(index, object) object.is_a?(Array) ? index == object.size - 1 : true end
# File lib/chef/client.rb, line 1036 def profiling_prereqs! require "ruby-prof" rescue LoadError => e raise "You must have the ruby-prof gem installed in order to use --profile-ruby: #{e.message}" end
# File lib/chef/client.rb, line 1042 def start_profiling if Chef::Config[:slow_report] require_relative "handler/slow_report" Chef::Config.report_handlers << Chef::Handler::SlowReport.new(Chef::Config[:slow_report]) end return unless Chef::Config[:profile_ruby] profiling_prereqs! RubyProf.start end