-
-
Save sbates/739cb8e92f4e239c5949 to your computer and use it in GitHub Desktop.
First run via remote bootstrap, empty runlist
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
174.129.98.147 C:\Users\Administrator>chef-client -c c:/chef/client.rb -j c:/chef/first-boot.json -E _default | |
174.129.98.147 [Sat, 18 Feb 2012 16:48:48 +0000] INFO: *** Chef 0.10.8 *** | |
174.129.98.147 [Sat, 18 Feb 2012 16:49:16 +0000] INFO: Client key c:/chef/client.pem is not present - registering | |
174.129.98.147 [Sat, 18 Feb 2012 16:49:24 +0000] INFO: Setting the run_list to [] from JSON | |
174.129.98.147 [Sat, 18 Feb 2012 16:49:24 +0000] INFO: Run List is [] | |
174.129.98.147 [Sat, 18 Feb 2012 16:49:24 +0000] INFO: Run List expands to [] | |
174.129.98.147 [Sat, 18 Feb 2012 16:49:24 +0000] INFO: Starting Chef Run for ip-0A7A5A94 | |
174.129.98.147 [Sat, 18 Feb 2012 16:49:24 +0000] INFO: Running start handlers | |
174.129.98.147 [Sat, 18 Feb 2012 16:49:24 +0000] INFO: Start handlers complete. | |
174.129.98.147 [Sat, 18 Feb 2012 16:49:25 +0000] INFO: Loading cookbooks [] | |
174.129.98.147 [Sat, 18 Feb 2012 16:49:25 +0000] WARN: Node ip-0A7A5A94 has an empty run list. | |
174.129.98.147 [Sat, 18 Feb 2012 16:49:26 +0000] INFO: Chef Run complete in 1.295074 seconds | |
174.129.98.147 [Sat, 18 Feb 2012 16:49:26 +0000] INFO: Running report handlers | |
174.129.98.147 [Sat, 18 Feb 2012 16:49:26 +0000] INFO: Report handlers complete |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[Sat, 18 Feb 2012 17:03:33 +0000] INFO: *** Chef 0.10.8 *** | |
[Sat, 18 Feb 2012 17:03:33 +0000] DEBUG: Loading plugin os | |
[Sat, 18 Feb 2012 17:03:33 +0000] DEBUG: Loading plugin kernel | |
[Sat, 18 Feb 2012 17:03:33 +0000] DEBUG: Loading plugin ruby | |
[Sat, 18 Feb 2012 17:03:33 +0000] DEBUG: Loading plugin languages | |
[Sat, 18 Feb 2012 17:03:34 +0000] DEBUG: ---- Begin ruby -e "require 'rbconfig'; puts %Q(platform=#{RUBY_PLATF | |
ORM},version=#{RUBY_VERSION},release_date=#{RUBY_RELEASE_DATE},target=#{::Config::CONFIG['target']},target_cpu | |
=#{::Config::CONFIG['target_cpu']},target_vendor=#{::Config::CONFIG['target_vendor']},target_os=#{::Config::CO | |
NFIG['target_os']},host=#{::Config::CONFIG['host']},host_cpu=#{::Config::CONFIG['host_cpu']},host_os=#{::Confi | |
g::CONFIG['host_os']},host_vendor=#{::Config::CONFIG['host_vendor']},bin_dir=#{::Config::CONFIG['bindir']},rub | |
y_bin=#{::File.join(::Config::CONFIG['bindir'], ::Config::CONFIG['ruby_install_name'])},)" STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:34 +0000] DEBUG: platform=i386-mingw32,version=1.9.2,release_date=2011-07-09,target=i3 | |
86-pc-mingw32,target_cpu=i386,target_vendor=pc,target_os=mingw32,host=i686-pc-mingw32,host_cpu=i686,host_os=mi | |
ngw32,host_vendor=pc,bin_dir=C:/opscode/chef/embedded/bin,ruby_bin=C:/opscode/chef/embedded/bin/ruby, | |
[Sat, 18 Feb 2012 17:03:34 +0000] DEBUG: ---- End ruby -e "require 'rbconfig'; puts %Q(platform=#{RUBY_PLATFOR | |
M},version=#{RUBY_VERSION},release_date=#{RUBY_RELEASE_DATE},target=#{::Config::CONFIG['target']},target_cpu=# | |
{::Config::CONFIG['target_cpu']},target_vendor=#{::Config::CONFIG['target_vendor']},target_os=#{::Config::CONF | |
IG['target_os']},host=#{::Config::CONFIG['host']},host_cpu=#{::Config::CONFIG['host_cpu']},host_os=#{::Config: | |
:CONFIG['host_os']},host_vendor=#{::Config::CONFIG['host_vendor']},bin_dir=#{::Config::CONFIG['bindir']},ruby_ | |
bin=#{::File.join(::Config::CONFIG['bindir'], ::Config::CONFIG['ruby_install_name'])},)" STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:34 +0000] DEBUG: ---- Begin ruby -e "require 'rbconfig'; puts %Q(platform=#{RUBY_PLATF | |
ORM},version=#{RUBY_VERSION},release_date=#{RUBY_RELEASE_DATE},target=#{::Config::CONFIG['target']},target_cpu | |
=#{::Config::CONFIG['target_cpu']},target_vendor=#{::Config::CONFIG['target_vendor']},target_os=#{::Config::CO | |
NFIG['target_os']},host=#{::Config::CONFIG['host']},host_cpu=#{::Config::CONFIG['host_cpu']},host_os=#{::Confi | |
g::CONFIG['host_os']},host_vendor=#{::Config::CONFIG['host_vendor']},bin_dir=#{::Config::CONFIG['bindir']},rub | |
y_bin=#{::File.join(::Config::CONFIG['bindir'], ::Config::CONFIG['ruby_install_name'])},)" STDERR ---- | |
[Sat, 18 Feb 2012 17:03:34 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:34 +0000] DEBUG: ---- End ruby -e "require 'rbconfig'; puts %Q(platform=#{RUBY_PLATFOR | |
M},version=#{RUBY_VERSION},release_date=#{RUBY_RELEASE_DATE},target=#{::Config::CONFIG['target']},target_cpu=# | |
{::Config::CONFIG['target_cpu']},target_vendor=#{::Config::CONFIG['target_vendor']},target_os=#{::Config::CONF | |
IG['target_os']},host=#{::Config::CONFIG['host']},host_cpu=#{::Config::CONFIG['host_cpu']},host_os=#{::Config: | |
:CONFIG['host_os']},host_vendor=#{::Config::CONFIG['host_vendor']},bin_dir=#{::Config::CONFIG['bindir']},ruby_ | |
bin=#{::File.join(::Config::CONFIG['bindir'], ::Config::CONFIG['ruby_install_name'])},)" STDERR ---- | |
[Sat, 18 Feb 2012 17:03:34 +0000] DEBUG: Ran (ruby -e "require 'rbconfig'; puts %Q(platform=#{RUBY_PLATFORM}, | |
version=#{RUBY_VERSION},release_date=#{RUBY_RELEASE_DATE},target=#{::Config::CONFIG['target']},target_cpu=#{:: | |
Config::CONFIG['target_cpu']},target_vendor=#{::Config::CONFIG['target_vendor']},target_os=#{::Config::CONFIG[ | |
'target_os']},host=#{::Config::CONFIG['host']},host_cpu=#{::Config::CONFIG['host_cpu']},host_os=#{::Config::CO | |
NFIG['host_os']},host_vendor=#{::Config::CONFIG['host_vendor']},bin_dir=#{::Config::CONFIG['bindir']},ruby_bin | |
=#{::File.join(::Config::CONFIG['bindir'], ::Config::CONFIG['ruby_install_name'])},)") returned 0 | |
[Sat, 18 Feb 2012 17:03:35 +0000] DEBUG: ---- Begin ruby -e "require 'rbconfig'; require 'rubygems'; puts ::Ge | |
m.default_exec_format % 'gem'" STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:35 +0000] DEBUG: gem | |
[Sat, 18 Feb 2012 17:03:35 +0000] DEBUG: ---- End ruby -e "require 'rbconfig'; require 'rubygems'; puts ::Gem. | |
default_exec_format % 'gem'" STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:35 +0000] DEBUG: ---- Begin ruby -e "require 'rbconfig'; require 'rubygems'; puts ::Ge | |
m.default_exec_format % 'gem'" STDERR ---- | |
[Sat, 18 Feb 2012 17:03:35 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:35 +0000] DEBUG: ---- End ruby -e "require 'rbconfig'; require 'rubygems'; puts ::Gem. | |
default_exec_format % 'gem'" STDERR ---- | |
[Sat, 18 Feb 2012 17:03:35 +0000] DEBUG: Ran (ruby -e "require 'rbconfig'; require 'rubygems'; puts ::Gem.def | |
ault_exec_format % 'gem'") returned 0 | |
[Sat, 18 Feb 2012 17:03:38 +0000] DEBUG: ---- Begin ruby -e "require 'rbconfig'; puts %x{C:/opscode/chef/embed | |
ded/bin/ruby C:/opscode/chef/embedded/bin/gem env gemdir}.chomp!" STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:38 +0000] DEBUG: C:/opscode/chef/embedded/lib/ruby/gems/1.9.1 | |
[Sat, 18 Feb 2012 17:03:38 +0000] DEBUG: ---- End ruby -e "require 'rbconfig'; puts %x{C:/opscode/chef/embedde | |
d/bin/ruby C:/opscode/chef/embedded/bin/gem env gemdir}.chomp!" STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:38 +0000] DEBUG: ---- Begin ruby -e "require 'rbconfig'; puts %x{C:/opscode/chef/embed | |
ded/bin/ruby C:/opscode/chef/embedded/bin/gem env gemdir}.chomp!" STDERR ---- | |
[Sat, 18 Feb 2012 17:03:38 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:38 +0000] DEBUG: ---- End ruby -e "require 'rbconfig'; puts %x{C:/opscode/chef/embedde | |
d/bin/ruby C:/opscode/chef/embedded/bin/gem env gemdir}.chomp!" STDERR ---- | |
[Sat, 18 Feb 2012 17:03:38 +0000] DEBUG: Ran (ruby -e "require 'rbconfig'; puts %x{C:/opscode/chef/embedded/b | |
in/ruby C:/opscode/chef/embedded/bin/gem env gemdir}.chomp!") returned 0 | |
[Sat, 18 Feb 2012 17:03:38 +0000] DEBUG: Loading plugin windows::kernel | |
[Sat, 18 Feb 2012 17:03:43 +0000] DEBUG: Loading plugin c | |
[Sat, 18 Feb 2012 17:03:43 +0000] DEBUG: Failed to run: gcc -v, assuming command not found | |
[Sat, 18 Feb 2012 17:03:43 +0000] DEBUG: ---- Begin gcc -v STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:43 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:43 +0000] DEBUG: ---- End gcc -v STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:43 +0000] DEBUG: ---- Begin gcc -v STDERR ---- | |
[Sat, 18 Feb 2012 17:03:43 +0000] DEBUG: Failed to run: gcc -v, assuming command not found | |
[Sat, 18 Feb 2012 17:03:43 +0000] DEBUG: ---- End gcc -v STDERR ---- | |
[Sat, 18 Feb 2012 17:03:43 +0000] DEBUG: Ran (gcc -v) returned 42 | |
[Sat, 18 Feb 2012 17:03:44 +0000] DEBUG: Failed to run: /lib/libc.so.6, assuming command not found | |
[Sat, 18 Feb 2012 17:03:44 +0000] DEBUG: ---- Begin /lib/libc.so.6 STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:44 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:44 +0000] DEBUG: ---- End /lib/libc.so.6 STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:44 +0000] DEBUG: ---- Begin /lib/libc.so.6 STDERR ---- | |
[Sat, 18 Feb 2012 17:03:44 +0000] DEBUG: Failed to run: /lib/libc.so.6, assuming command not found | |
[Sat, 18 Feb 2012 17:03:44 +0000] DEBUG: ---- End /lib/libc.so.6 STDERR ---- | |
[Sat, 18 Feb 2012 17:03:44 +0000] DEBUG: Ran (/lib/libc.so.6) returned 42 | |
[Sat, 18 Feb 2012 17:03:45 +0000] DEBUG: Failed to run: /lib64/libc.so.6, assuming command not found | |
[Sat, 18 Feb 2012 17:03:45 +0000] DEBUG: ---- Begin /lib64/libc.so.6 STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:45 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:45 +0000] DEBUG: ---- End /lib64/libc.so.6 STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:45 +0000] DEBUG: ---- Begin /lib64/libc.so.6 STDERR ---- | |
[Sat, 18 Feb 2012 17:03:45 +0000] DEBUG: Failed to run: /lib64/libc.so.6, assuming command not found | |
[Sat, 18 Feb 2012 17:03:45 +0000] DEBUG: ---- End /lib64/libc.so.6 STDERR ---- | |
[Sat, 18 Feb 2012 17:03:45 +0000] DEBUG: Ran (/lib64/libc.so.6) returned 42 | |
[Sat, 18 Feb 2012 17:03:46 +0000] DEBUG: Failed to run: cl /?, assuming command not found | |
[Sat, 18 Feb 2012 17:03:46 +0000] DEBUG: ---- Begin cl /? STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:46 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:46 +0000] DEBUG: ---- End cl /? STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:46 +0000] DEBUG: ---- Begin cl /? STDERR ---- | |
[Sat, 18 Feb 2012 17:03:46 +0000] DEBUG: Failed to run: cl /?, assuming command not found | |
[Sat, 18 Feb 2012 17:03:46 +0000] DEBUG: ---- End cl /? STDERR ---- | |
[Sat, 18 Feb 2012 17:03:46 +0000] DEBUG: Ran (cl /?) returned 42 | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: Failed to run: devenv.com /?, assuming command not found | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: ---- Begin devenv.com /? STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: ---- End devenv.com /? STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: ---- Begin devenv.com /? STDERR ---- | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: Failed to run: devenv.com /?, assuming command not found | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: ---- End devenv.com /? STDERR ---- | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: Ran (devenv.com /?) returned 42 | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: Failed to run: xlc -qversion, assuming command not found | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: ---- Begin xlc -qversion STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: ---- End xlc -qversion STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: ---- Begin xlc -qversion STDERR ---- | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: Failed to run: xlc -qversion, assuming command not found | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: ---- End xlc -qversion STDERR ---- | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: Ran (xlc -qversion) returned 42 | |
[Sat, 18 Feb 2012 17:03:48 +0000] DEBUG: Failed to run: cc -V -flags, assuming command not found | |
[Sat, 18 Feb 2012 17:03:48 +0000] DEBUG: ---- Begin cc -V -flags STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:48 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:48 +0000] DEBUG: ---- End cc -V -flags STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:48 +0000] DEBUG: ---- Begin cc -V -flags STDERR ---- | |
[Sat, 18 Feb 2012 17:03:48 +0000] DEBUG: Failed to run: cc -V -flags, assuming command not found | |
[Sat, 18 Feb 2012 17:03:48 +0000] DEBUG: ---- End cc -V -flags STDERR ---- | |
[Sat, 18 Feb 2012 17:03:48 +0000] DEBUG: Ran (cc -V -flags) returned 42 | |
[Sat, 18 Feb 2012 17:03:49 +0000] DEBUG: Failed to run: what /opt/ansic/bin/cc, assuming command not found | |
[Sat, 18 Feb 2012 17:03:49 +0000] DEBUG: ---- Begin what /opt/ansic/bin/cc STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:49 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:49 +0000] DEBUG: ---- End what /opt/ansic/bin/cc STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:49 +0000] DEBUG: ---- Begin what /opt/ansic/bin/cc STDERR ---- | |
[Sat, 18 Feb 2012 17:03:49 +0000] DEBUG: Failed to run: what /opt/ansic/bin/cc, assuming command not found | |
[Sat, 18 Feb 2012 17:03:49 +0000] DEBUG: ---- End what /opt/ansic/bin/cc STDERR ---- | |
[Sat, 18 Feb 2012 17:03:49 +0000] DEBUG: Ran (what /opt/ansic/bin/cc) returned 42 | |
[Sat, 18 Feb 2012 17:03:49 +0000] DEBUG: Loading plugin chef | |
[Sat, 18 Feb 2012 17:03:49 +0000] DEBUG: Loading plugin cloud | |
[Sat, 18 Feb 2012 17:03:49 +0000] DEBUG: Loading plugin ec2 | |
[Sat, 18 Feb 2012 17:03:49 +0000] DEBUG: Loading plugin hostname | |
[Sat, 18 Feb 2012 17:03:49 +0000] DEBUG: Loading plugin windows::hostname | |
[Sat, 18 Feb 2012 17:03:49 +0000] DEBUG: Loading plugin network | |
[Sat, 18 Feb 2012 17:03:49 +0000] DEBUG: Loading plugin windows::network | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: ---- Begin arp -a STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: Interface: 10.122.90.148 --- 0xb | |
Internet Address Physical Address Type | |
10.122.90.1 fe-ff-ff-ff-ff-ff dynamic | |
10.122.91.255 ff-ff-ff-ff-ff-ff static | |
169.254.1.0 fe-ff-ff-ff-ff-ff dynamic | |
169.254.169.254 fe-ff-ff-ff-ff-ff dynamic | |
224.0.0.22 01-00-5e-00-00-16 static | |
224.0.0.252 01-00-5e-00-00-fc static | |
239.255.255.250 01-00-5e-7f-ff-fa static | |
255.255.255.255 ff-ff-ff-ff-ff-ff static | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: ---- End arp -a STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: ---- Begin arp -a STDERR ---- | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: ---- End arp -a STDERR ---- | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: Ran (arp -a) returned 0 | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: Using default interface for default ip and mac address | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: has_ec2_mac? == true | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: can_metadata_connect? == true | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: looks_like_ec2? == true | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: Loading plugin rackspace | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: Loading plugin eucalyptus | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: has_euca_mac? == false | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: has_euca_mac? == false | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: looks_like_euca? == false | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: Loading plugin command | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: Loading plugin dmi | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: Plugin dmi threw exception #<NameError: uninitialized constant Fcntl: | |
:F_SETFD> C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/mixin/command.rb:162:in `pope | |
n4' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/plugins/dmi.rb:46:in `from_file' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/mixin/from_file.rb:29:in `instance_eval | |
' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/mixin/from_file.rb:29:in `from_file' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:190:in `block in require_plug | |
in' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:185:in `each' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:185:in `require_plugin' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:117:in `block (2 levels) in a | |
ll_plugins' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:110:in `each' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:110:in `block in all_plugins' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:108:in `each' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:108:in `all_plugins' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/client.rb:208:in `run_ohai' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/client.rb:149:in `run' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:239:in `block in | |
run_application' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:229:in `loop' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:229:in `run_appli | |
cation' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application.rb:67:in `run' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/bin/chef-client:26:in `<top (required)>' | |
C:/opscode/chef/bin/chef-client:19:in `load' | |
C:/opscode/chef/bin/chef-client:19:in `<main>' | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: Loading plugin dmi_common | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: Loading plugin erlang | |
[Sat, 18 Feb 2012 17:03:52 +0000] DEBUG: Failed to run: erl +V, assuming command not found | |
[Sat, 18 Feb 2012 17:03:52 +0000] DEBUG: ---- Begin erl +V STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:52 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:52 +0000] DEBUG: ---- End erl +V STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:52 +0000] DEBUG: ---- Begin erl +V STDERR ---- | |
[Sat, 18 Feb 2012 17:03:52 +0000] DEBUG: Failed to run: erl +V, assuming command not found | |
[Sat, 18 Feb 2012 17:03:52 +0000] DEBUG: ---- End erl +V STDERR ---- | |
[Sat, 18 Feb 2012 17:03:52 +0000] DEBUG: Ran (erl +V) returned 42 | |
[Sat, 18 Feb 2012 17:03:52 +0000] DEBUG: Loading plugin groovy | |
[Sat, 18 Feb 2012 17:03:53 +0000] DEBUG: Failed to run: groovy -v, assuming command not found | |
[Sat, 18 Feb 2012 17:03:53 +0000] DEBUG: ---- Begin groovy -v STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:53 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:53 +0000] DEBUG: ---- End groovy -v STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:53 +0000] DEBUG: ---- Begin groovy -v STDERR ---- | |
[Sat, 18 Feb 2012 17:03:53 +0000] DEBUG: Failed to run: groovy -v, assuming command not found | |
[Sat, 18 Feb 2012 17:03:53 +0000] DEBUG: ---- End groovy -v STDERR ---- | |
[Sat, 18 Feb 2012 17:03:53 +0000] DEBUG: Ran (groovy -v) returned 42 | |
[Sat, 18 Feb 2012 17:03:53 +0000] DEBUG: Loading plugin ip_scopes | |
[Sat, 18 Feb 2012 17:03:53 +0000] DEBUG: ip_scopes: cannot load gem, plugin disabled: no such file to load -- | |
ipaddr_extensions | |
[Sat, 18 Feb 2012 17:03:53 +0000] DEBUG: Loading plugin java | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: Failed to run: java -version, assuming command not found | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: ---- Begin java -version STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: ---- End java -version STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: ---- Begin java -version STDERR ---- | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: Failed to run: java -version, assuming command not found | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: ---- End java -version STDERR ---- | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: Ran (java -version) returned 42 | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: Loading plugin keys | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: Loading plugin lua | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: Failed to run: lua -v, assuming command not found | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: ---- Begin lua -v STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: ---- End lua -v STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: ---- Begin lua -v STDERR ---- | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: Failed to run: lua -v, assuming command not found | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: ---- End lua -v STDERR ---- | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: Ran (lua -v) returned 42 | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: Loading plugin mono | |
[Sat, 18 Feb 2012 17:03:55 +0000] DEBUG: Failed to run: mono -V, assuming command not found | |
[Sat, 18 Feb 2012 17:03:55 +0000] DEBUG: ---- Begin mono -V STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:55 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:55 +0000] DEBUG: ---- End mono -V STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:55 +0000] DEBUG: ---- Begin mono -V STDERR ---- | |
[Sat, 18 Feb 2012 17:03:55 +0000] DEBUG: Failed to run: mono -V, assuming command not found | |
[Sat, 18 Feb 2012 17:03:55 +0000] DEBUG: ---- End mono -V STDERR ---- | |
[Sat, 18 Feb 2012 17:03:55 +0000] DEBUG: Ran (mono -V) returned 42 | |
[Sat, 18 Feb 2012 17:03:55 +0000] DEBUG: Loading plugin network_listeners | |
[Sat, 18 Feb 2012 17:03:55 +0000] DEBUG: Plugin network_listeners threw exception #<LoadError: no such file to | |
load -- sigar> C:/opscode/chef/embedded/lib/ruby/site_ruby/1.9.1/rubygems/custom_require.rb:36:in `require' | |
C:/opscode/chef/embedded/lib/ruby/site_ruby/1.9.1/rubygems/custom_require.rb:36:in `require' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/plugins/network_listeners.rb:19:in `fro | |
m_file' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/mixin/from_file.rb:29:in `instance_eval | |
' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/mixin/from_file.rb:29:in `from_file' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:190:in `block in require_plug | |
in' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:185:in `each' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:185:in `require_plugin' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:117:in `block (2 levels) in a | |
ll_plugins' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:110:in `each' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:110:in `block in all_plugins' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:108:in `each' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:108:in `all_plugins' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/client.rb:208:in `run_ohai' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/client.rb:149:in `run' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:239:in `block in | |
run_application' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:229:in `loop' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:229:in `run_appli | |
cation' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application.rb:67:in `run' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/bin/chef-client:26:in `<top (required)>' | |
C:/opscode/chef/bin/chef-client:19:in `load' | |
C:/opscode/chef/bin/chef-client:19:in `<main>' | |
[Sat, 18 Feb 2012 17:03:55 +0000] DEBUG: Loading plugin ohai | |
[Sat, 18 Feb 2012 17:03:55 +0000] DEBUG: Loading plugin ohai_time | |
[Sat, 18 Feb 2012 17:03:55 +0000] DEBUG: Loading plugin passwd | |
[Sat, 18 Feb 2012 17:03:55 +0000] DEBUG: Loading plugin perl | |
[Sat, 18 Feb 2012 17:03:56 +0000] DEBUG: ---- Begin perl -V:version -V:archname STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:56 +0000] DEBUG: version='5.8.8'; | |
archname='msys-64int'; | |
[Sat, 18 Feb 2012 17:03:56 +0000] DEBUG: ---- End perl -V:version -V:archname STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:56 +0000] DEBUG: ---- Begin perl -V:version -V:archname STDERR ---- | |
[Sat, 18 Feb 2012 17:03:56 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:56 +0000] DEBUG: ---- End perl -V:version -V:archname STDERR ---- | |
[Sat, 18 Feb 2012 17:03:56 +0000] DEBUG: Ran (perl -V:version -V:archname) returned 0 | |
[Sat, 18 Feb 2012 17:03:56 +0000] DEBUG: Loading plugin php | |
[Sat, 18 Feb 2012 17:03:57 +0000] DEBUG: Failed to run: php -v, assuming command not found | |
[Sat, 18 Feb 2012 17:03:57 +0000] DEBUG: ---- Begin php -v STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:57 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:57 +0000] DEBUG: ---- End php -v STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:57 +0000] DEBUG: ---- Begin php -v STDERR ---- | |
[Sat, 18 Feb 2012 17:03:57 +0000] DEBUG: Failed to run: php -v, assuming command not found | |
[Sat, 18 Feb 2012 17:03:57 +0000] DEBUG: ---- End php -v STDERR ---- | |
[Sat, 18 Feb 2012 17:03:57 +0000] DEBUG: Ran (php -v) returned 42 | |
[Sat, 18 Feb 2012 17:03:57 +0000] DEBUG: Loading plugin platform | |
[Sat, 18 Feb 2012 17:03:57 +0000] DEBUG: Loading plugin windows::platform | |
[Sat, 18 Feb 2012 17:03:57 +0000] DEBUG: Loading plugin python | |
[Sat, 18 Feb 2012 17:03:58 +0000] DEBUG: Failed to run: python -c "import sys; print sys.version", assuming co | |
mmand not found | |
[Sat, 18 Feb 2012 17:03:58 +0000] DEBUG: ---- Begin python -c "import sys; print sys.version" STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:58 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:58 +0000] DEBUG: ---- End python -c "import sys; print sys.version" STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:58 +0000] DEBUG: ---- Begin python -c "import sys; print sys.version" STDERR ---- | |
[Sat, 18 Feb 2012 17:03:58 +0000] DEBUG: Failed to run: python -c "import sys; print sys.version", assuming co | |
mmand not found | |
[Sat, 18 Feb 2012 17:03:58 +0000] DEBUG: ---- End python -c "import sys; print sys.version" STDERR ---- | |
[Sat, 18 Feb 2012 17:03:58 +0000] DEBUG: Ran (python -c "import sys; print sys.version") returned 42 | |
[Sat, 18 Feb 2012 17:03:58 +0000] DEBUG: Loading plugin uptime | |
[Sat, 18 Feb 2012 17:03:58 +0000] DEBUG: Loading plugin virtualization | |
[Sat, 18 Feb 2012 17:03:58 +0000] DEBUG: Loading plugin windows::virtualization | |
[Sat, 18 Feb 2012 17:03:58 +0000] DEBUG: Plugin windows::virtualization threw exception #<IOError: Cannot open | |
or read C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/plugins/windows/virtualization | |
.rb!> C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/mixin/from_file.rb:31:in `from_fi | |
le' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:190:in `block in require_plug | |
in' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:185:in `each' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:185:in `require_plugin' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/plugins/virtualization.rb:21:in `from_f | |
ile' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/mixin/from_file.rb:29:in `instance_eval | |
' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/mixin/from_file.rb:29:in `from_file' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:190:in `block in require_plug | |
in' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:185:in `each' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:185:in `require_plugin' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:117:in `block (2 levels) in a | |
ll_plugins' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:110:in `each' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:110:in `block in all_plugins' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:108:in `each' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:108:in `all_plugins' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/client.rb:208:in `run_ohai' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/client.rb:149:in `run' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:239:in `block in | |
run_application' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:229:in `loop' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:229:in `run_appli | |
cation' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application.rb:67:in `run' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/bin/chef-client:26:in `<top (required)>' | |
C:/opscode/chef/bin/chef-client:19:in `load' | |
C:/opscode/chef/bin/chef-client:19:in `<main>' | |
[Sat, 18 Feb 2012 17:03:58 +0000] DEBUG: Loading plugin windows::cpu | |
[Sat, 18 Feb 2012 17:03:59 +0000] DEBUG: Loading plugin windows::filesystem | |
[Sat, 18 Feb 2012 17:03:59 +0000] DEBUG: Client key c:/chef/client.pem is present - skipping registration | |
[Sat, 18 Feb 2012 17:03:59 +0000] DEBUG: Building node object for ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:03:59 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:05 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:XPKIyzaDmGFyGStenynpzDhBAzI= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:03:59Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:03 | |
:59Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"Y/hKaq8CTozEHJdzPZ8FS30 | |
m4p1xl6vAXGf8QZBIRJBCMnbBCv2etcJpXMqt", "X-Ops-Authorization-2"=>"CpBHfEj+xJWi7C6HY9djM3yAHA2YdYvGsg+k1ZAHcZdy | |
zOdUmSjd3JvwPoPP", "X-Ops-Authorization-3"=>"24HMiEzm2ZXww6YDpvAWAk4+aHFxFwEqRfiZbVztMFT+lWpDvSuyi7+NfliL", "X | |
-Ops-Authorization-4"=>"76PPapV9w/evm4bxNdzcRXPh/kl4yXN8ku3F4TmhTJm5UAC6ENvSzT1TNAcb", "X-Ops-Authorization-5" | |
=>"LPqi3rG02oBz0glv9QH9mHO6RNOkWvBpNwFq1cmKa5XWwlpZZLYczwynswlQ", "X-Ops-Authorization-6"=>"gCIYMMvfRcUXF5nZpN | |
6vuQNFKuzmBmC6Ra66sv709Q=="} | |
[Sat, 18 Feb 2012 17:04:05 +0000] DEBUG: Sending HTTP Request via GET to api.opscode.com:443/organizations/bra | |
ttyredhead/nodes/ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:05 +0000] DEBUG: Extracting run list from JSON attributes provided on command line | |
[Sat, 18 Feb 2012 17:04:05 +0000] DEBUG: Applying attributes from json file | |
[Sat, 18 Feb 2012 17:04:05 +0000] DEBUG: Platform is windows version 6.0.6002 | |
[Sat, 18 Feb 2012 17:04:05 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:05 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:TyNEZ9b5oVo4I8SwVIACOVCQNU0= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:05Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:05Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"0OUIqI00AoO5+T+GtW0Symj | |
2QnGU8I/aGehGtuzgcbrtlemhVM8IxhYLDEvL", "X-Ops-Authorization-2"=>"gZGuvaC+wNL4WemgkLwL1onySlRemPxWv/QHUGZv4VsX | |
sY0xVPDei0zaW3ko", "X-Ops-Authorization-3"=>"4FgO3dzCwyBKW8pAs8JaFtbmARmJkiXu3JUoUP3IugEHR0Aye1uu2FrA3Q7T", "X | |
-Ops-Authorization-4"=>"q1lkx/p2CmkCJiS6I/NKBgihMx86knF9H1DD1d58EuASUup2mQZtTPQq0ZDo", "X-Ops-Authorization-5" | |
=>"+UeVqXqLpaAP5gWCwf+t/r/rF8qwwyxSNYMKNy3xAZOFJe/146bYVxBwwcvN", "X-Ops-Authorization-6"=>"ggRTM2POu5+ZscXzTz | |
hqX3g771zeLxpaKaxhHUmLDQ=="} | |
[Sat, 18 Feb 2012 17:04:05 +0000] DEBUG: Sending HTTP Request via GET to api.opscode.com:443/organizations/bra | |
ttyredhead/roles/sql | |
[Sat, 18 Feb 2012 17:04:06 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:06 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:UJk/v1x/TuoYEsIj1MzU4JjwTKs= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:06Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:06Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"hDJmyFFzLE1ttTQpelBomCm | |
N2nlBNtS8gk1Q+1zQdVhP31CFKeQYByvnLxw/", "X-Ops-Authorization-2"=>"Edrir05JzRr3PAcb/BFr7ybZCfspufPSShClGh1xk4zc | |
bqnBRbS2ApLn637h", "X-Ops-Authorization-3"=>"Lkcy2m25T0CuIS7XbCsY74zJvdnuUkpSD2GIjY/uor0u5kJGPSZl+rRHdkzv", "X | |
-Ops-Authorization-4"=>"/OERRKKmeIcAiNnbxIrJqP5gVmJs1emLKHxZ0+SQBfciSt6xUJI6Pl0UKJ6/", "X-Ops-Authorization-5" | |
=>"3q597mcCrrZFjTYhXRVHpi4aIIF2C4aVMk9a44sRB9ZZP9gsBjUxMAiPP1eA", "X-Ops-Authorization-6"=>"xaa+wZg48gKi3Fi0pm | |
G64jib9fTzq8HX1//UGMdorw=="} | |
[Sat, 18 Feb 2012 17:04:06 +0000] DEBUG: Sending HTTP Request via GET to api.opscode.com:443/organizations/bra | |
ttyredhead/roles/sql_base | |
[Sat, 18 Feb 2012 17:04:06 +0000] INFO: Run List is [role[sql]] | |
[Sat, 18 Feb 2012 17:04:06 +0000] INFO: Run List expands to [openssl, windows, sql_server::server] | |
[Sat, 18 Feb 2012 17:04:06 +0000] INFO: Starting Chef Run for ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:06 +0000] INFO: Running start handlers | |
[Sat, 18 Feb 2012 17:04:06 +0000] INFO: Start handlers complete. | |
[Sat, 18 Feb 2012 17:04:06 +0000] DEBUG: Synchronizing cookbooks | |
[Sat, 18 Feb 2012 17:04:06 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:06 +0000] DEBUG: String to sign: 'Method:POST | |
Hashed Path:V5B7KhUnbo0/Lvdmc1he8waUwLM= | |
X-Ops-Content-Hash:dSaIbCpyX2AYAVK8dH4B4gFSsos= | |
X-Ops-Timestamp:2012-02-18T17:04:06Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:06Z", "X-Ops-Content-Hash"=>"dSaIbCpyX2AYAVK8dH4B4gFSsos=", "X-Ops-Authorization-1"=>"I6bt2Fyp9M7WLFOCCdiKwtA | |
UEqPI/Euy5E2qy0w9TT3VIyqvG4YaJFH/Rxb+", "X-Ops-Authorization-2"=>"cRJtaQCeevjRvG8k4p6krLV0BkC/pyTbjsih3FSvq2Bj | |
WHCx4VaYuJGcp1KZ", "X-Ops-Authorization-3"=>"DouXbokzxBmc4v2D0bZQHZ1S/FcwUj9KqAUNhEulJsy62cHTRxFOfhoM+sYz", "X | |
-Ops-Authorization-4"=>"SU1D6YU79j2k3YB50BoYiTMC4PpPGBbJswuI5nH2qZJCFmb3kJBazmI0kDkL", "X-Ops-Authorization-5" | |
=>"a20ZBsDcbsGbykb13n6V817Fytz3qjl3aJOW1iMs3ga++kdrfhdIZQ8Rv6p/", "X-Ops-Authorization-6"=>"6TfSVNORsqRQWqyS9N | |
huUeiK4H+wrmbg0FZ7gZpJWw=="} | |
[Sat, 18 Feb 2012 17:04:06 +0000] DEBUG: Sending HTTP Request via POST to api.opscode.com:443/organizations/br | |
attyredhead/environments/_default/cookbook_versions | |
[Sat, 18 Feb 2012 17:04:07 +0000] INFO: Loading cookbooks [chef_handler, openssl, sql_server, windows] | |
[Sat, 18 Feb 2012 17:04:07 +0000] DEBUG: Cookbooks detail: {"sql_server"=>#<Chef::CookbookVersion:0x2d3f168 @n | |
ame="sql_server", @frozen=false, @attribute_filenames=["client.rb", "default.rb", "server.rb"], @definition_fi | |
lenames=[], @template_filenames=["ConfigurationFile.ini.erb", "restart.rb.erb"], @file_filenames=[], @recipe_f | |
ilenames=["client.rb", "default.rb", "server.rb"], @recipe_filenames_by_name={"client"=>"client.rb", "default" | |
=>"default.rb", "server"=>"server.rb"}, @library_filenames=["helper.rb"], @resource_filenames=[], @provider_fi | |
lenames=[], @metadata_filenames=[], @root_dir=nil, @root_filenames=["metadata.json", "metadata.rb", "README.md | |
"], @couchdb_id=nil, @couchdb=#<Chef::CouchDB:0x2d3f048 @db="chef", @rest=#<Chef::REST:0x2d3f030 @url="http:// | |
localhost:5984", @cookies={}, @default_headers={}, @auth_credentials=#<Chef::REST::AuthCredentials:0x2d3efe8 @ | |
key_file=nil, @client_name=nil>, @sign_request=true, @sign_on_redirect=true, @redirects_followed=0, @redirect_ | |
limit=10>>, @couchdb_rev=nil, @status=:ready, @manifest={"definitions"=>[], "name"=>"sql_server-1.0.4", "attri | |
butes"=>[{"name"=>"client.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization- | |
5beb2e18f5854d1a90067d55bcbe98d8/checksum-0dad586b72c47622851e9f163aad51ed?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA | |
&Expires=1329588248&Signature=bqVZxNW22pKKESuc0Kf9hVDnAhU%3D", "checksum"=>"0dad586b72c47622851e9f163aad51ed", | |
"path"=>"attributes/client.rb", "specificity"=>"default"}, {"name"=>"default.rb", "url"=>"https://s3.amazonaw | |
s.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-41bfed5c92529a2d | |
dd6141342f4e21cd?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=sNZ7Sj271gIw5eGeAZs5iOQ6HBg% | |
3D", "checksum"=>"41bfed5c92529a2ddd6141342f4e21cd", "path"=>"attributes/default.rb", "specificity"=>"default" | |
}, {"name"=>"server.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e | |
18f5854d1a90067d55bcbe98d8/checksum-c05f7b6b32109edbc16b4ec21c47be1f?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expir | |
es=1329588248&Signature=SW9sc%2FkAY0fGTHyB%2BHFTmJNouS4%3D", "checksum"=>"c05f7b6b32109edbc16b4ec21c47be1f", " | |
path"=>"attributes/server.rb", "specificity"=>"default"}], "files"=>[], "json_class"=>"Chef::CookbookVersion", | |
"providers"=>[], "metadata"=>{"name"=>"sql_server", "description"=>"Installs/Configures Microsoft SQL Server | |
2008 R2", "long_description"=>"Description\n===========\n\nInstalls and configures Microsoft SQL Server 2008 R | |
2 server and client. By default the Express edition is installed, but the `sql_server::server` recipe support | |
s installation of other editions (see __Usage__ below).\n\nRequirements\n============\n\nPlatform\n--------\n\ | |
nTested on\n\n* Windows Server 2008 R2\n\nMay work on other versions of Windows.\n\nAttributes\n==========\n\n | |
default\n-------\n\nThe following attributes are used by both client and server recipes.\n\n* `node['sql_serve | |
r']['accept_eula']` - indicate that you accept the terms of the end user license, default is 'false'\n* `node[ | |
'sql_server']['product_key']` - Specifies the product key for the edition of SQL Server, default is `nil` (not | |
needed for SQL Server 2008 R2 Express installs)\n\nclient\n------\n\nThis file also contains download url, ch | |
ecksum and package name for all client installation packages. See the __Usage__ section below for more detail | |
s.\n\nserver\n------\n\n* `node['sql_server']['install_dir']` - main directory for installation, default is `C | |
:\\Program Files\\Microsoft SQL Server`\n* `node['sql_server']['port']` - static TCP port server should listen | |
on for client connections, default is `1433`\n* `node['sql_server']['instance_name']` - name of the default i | |
nstance, default is `SQLEXPRESS`\n* `node['sql_server']['instance_dir']` - root directory of the default insta | |
nce, default is `C:\\Program Files\\Microsoft SQL Server`\n\nThis file also contains download url, checksum an | |
d package name for the server installation package.\n\nUsage\n=====\n\ndefault\n-------\n\nIncludes the `sql_s | |
erver::client` recipe.\n\nclient\n------\n\nInstalls required the SQL Server Native Client and all required de | |
pendancies. These include:\n\n* [Microsoft SQL Server 2008 R2 Native Client](http://www.microsoft.com/download | |
/en/details.aspx?id=16978#SNAC)\n* [Microsoft SQL Server 2008 R2 Command Line Utilities (ie `sqlcmd`)](http:// | |
www.microsoft.com/download/en/details.aspx?id=16978#SQLCMD)\n* [Microsoft SQL Server System CLR Types](http:// | |
www.microsoft.com/download/en/details.aspx?id=16978#SQLSYSCLR)\n* [Microsoft SQL Server 2008 R2 Management Obj | |
ects](http://www.microsoft.com/download/en/details.aspx?id=16978#SMO)\n* [Windows PowerShell Extensions for SQ | |
L Server 2008 R2](http://www.microsoft.com/download/en/details.aspx?id=16978#PowerShell)\n\nThe SQL Server Nat | |
ive Client contains the SQL Server ODBC driver and the SQL Server OLE DB provider in one native dynamic link l | |
ibrary (DLL) supporting applications using native-code APIs (ODBC, OLE DB and ADO) to Microsoft SQL Server. I | |
n simple terms these packages should allow any other node to act as a client of a SQL Server instance.\n\nThe | |
[TinyTDS](https://github.com/rails-sqlserver/tiny_tds) gem is also installed as this is used in the SQL Server | |
providers for the `database` and `database_user` resources (see the `database` cookbook for more details).\n\ | |
nserver\n------\n\nInstalls SQL Server 2008 R2 Express. The installation is done using the `windows_package` | |
resource and [ConfigurationFile](http://msdn.microsoft.com/en-us/library/dd239405.aspx) generated from a `temp | |
late` resource. The installation is slightly opinionated and does the following:\n\n* Enables [Mixed Mode](ht | |
tp://msdn.microsoft.com/en-us/library/aa905171\\(v=sql.80\\).aspx) (Windows Authentication and SQL Server Auth | |
entication) authentication\n* Auto-generates and sets a strong password for the 'sa' account\n* sets a static | |
TCP port which is configurable via an attribute.\n\nInstalling any of the SQL Server server or client packages | |
in an unattended/automated way requires you to explicitly indicate that you accept the terms of the end user | |
license. The hooks have been added to all recipes to do this via an attribute. Create a role to set the `node | |
['sql_server']['accept_license_terms']` attribute to 'true'. For example:\n\n % cat roles/sql_server.rb\n | |
name \"sql_server\"\n description \"SQL Server database master\"\n run_list(\n \"recipe[sql_serv | |
er::server]\"\n )\n default_attributes(\n \"sql_server\" => {\n \"accept_eula\" => true\n | |
}\n )\n\nOut of the box this recipe installs the Express edition of SQL Server 2008 R2. If you would li | |
ke to install the Standard edition create a role as follows:\n\n % cat roles/sql_server.rb\n name \"sql_ | |
server_standard\"\n description \"SQL Server Stadard edition database master\"\n run_list(\n \"reci | |
pe[sql_server::server]\"\n )\n default_attributes(\n \"sql_server\" => {\n \"instance_name\" | |
=> \"MSSQLSERVER\",\n \"product_key\" => \"YOUR_PRODUCT_KEY_HERE\",\n \"accept_eula\" => true,\ | |
n \"server\" => {\n \"url\" => \"DOWNLOAD_LOCATION_OF_INSTALLATION_PACKAGE\",\n \"che | |
cksum\" => \"SHA256_OF_INSTALLATION_PACKAGE\"\n }\n }\n )\n\nDepending on your base Windows ins | |
tallation you may also need to open the configured static port in the Windows Firewall. In the name of securi | |
ty we do not do this by default but the follow code should get the job done:\n\n # unlock port in firewall\ | |
n # this should leverage firewall_rule resource\n # once COOK-689 is completed\n firewall_rule_name = | |
\"\#{node['sql_server']['instance_name']} Static Port\"\n\n execute \"open-static-port\" do\n command | |
\"netsh advfirewall firewall add rule name=\\\"\#{firewall_rule_name}\\\" dir=in action=allow protocol=TCP lo | |
calport=\#{node['sql_server']['port']}\"\n returns [0,1,42] # *sigh* cmd.exe return codes are wonky\n | |
not_if { SqlServer::Helper.firewall_rule_enabled?(firewall_rule_name) }\n end\n\nChanges/Roadmap\n======= | |
========\n\n## Future\n\n* license distribution and management\n* multi instance support (via an LWRP)\n* clus | |
tering support\n\n## 1.0.4:\n\n* bump windows cookbook dependency version to pick up Ruby 1.9 compat fixes\n\n | |
## 1.0.2:\n\n* [COOK-773] win_friendly_path is no longer a module_function\n* rename accept_license_terms attr | |
ibute to accept_eula for consistency with other cookbooks like iis\n\n## 1.0.0:\n\n* [COOK-681] initial releas | |
e\n\nLicense and Author\n==================\n\nAuthor:: Seth Chisamore (<schisamo@opscode.com>)\n\nCopyright:: | |
2011, Opscode, Inc.\n\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use thi | |
s file except in compliance with the License.\nYou may obtain a copy of the License at\n\n http://www.apach | |
e.org/licenses/LICENSE-2.0\n\nUnless required by applicable law or agreed to in writing, software\ndistributed | |
under the License is distributed on an \"AS IS\" BASIS,\nWITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either | |
express or implied.\nSee the License for the specific language governing permissions and\nlimitations under t | |
he License.\n", "maintainer"=>"Opscode, Inc.", "maintainer_email"=>"cookbooks@opscode.com", "license"=>"Apache | |
2.0", "platforms"=>{"windows"=>">= 0.0.0"}, "dependencies"=>{"windows"=>">= 1.2.6", "openssl"=>">= 0.0.0"}, " | |
recommendations"=>{}, "suggestions"=>{}, "conflicting"=>{}, "providing"=>{"sql_server"=>">= 0.0.0", "sql_serve | |
r::server"=>">= 0.0.0", "sql_server::client"=>">= 0.0.0"}, "replacing"=>{}, "attributes"=>{}, "groupings"=>{}, | |
"recipes"=>{"sql_server"=>"", "sql_server::server"=>"", "sql_server::client"=>""}, "version"=>"1.0.4"}, "libr | |
aries"=>[{"name"=>"helper.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization- | |
5beb2e18f5854d1a90067d55bcbe98d8/checksum-5f9fc3142e6965f2aca8bca763d170ed?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA | |
&Expires=1329588248&Signature=gQbZYplhAQQ92QCfkHFld8SsI9g%3D", "checksum"=>"5f9fc3142e6965f2aca8bca763d170ed", | |
"path"=>"libraries/helper.rb", "specificity"=>"default"}], "templates"=>[{"name"=>"ConfigurationFile.ini.erb" | |
, "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe9 | |
8d8/checksum-49d6eb820a2e2ca8069c834326d04aac?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature | |
=1wHxEeNrVXtltRARhCERf5i%2BWLU%3D", "checksum"=>"49d6eb820a2e2ca8069c834326d04aac", "path"=>"templates/default | |
/ConfigurationFile.ini.erb", "specificity"=>"default"}, {"name"=>"restart.rb.erb", "url"=>"https://s3.amazonaw | |
s.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-48df9f4d2475994d | |
70b79f24d695c7f4?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=DDSK9ApXBd1fuuyoqylQXuNaNm4% | |
3D", "checksum"=>"48df9f4d2475994d70b79f24d695c7f4", "path"=>"templates/default/restart.rb.erb", "specificity" | |
=>"default"}], "resources"=>[], "cookbook_name"=>"sql_server", "version"=>"1.0.4", "recipes"=>[{"name"=>"clien | |
t.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55 | |
bcbe98d8/checksum-395e4cda614b462b151de31f384a4cb1?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Sign | |
ature=uBcBhcD7D6bvaNSEXar7dZoOuiI%3D", "checksum"=>"395e4cda614b462b151de31f384a4cb1", "path"=>"recipes/client | |
.rb", "specificity"=>"default"}, {"name"=>"default.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-prod | |
uction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-4e8c4dd49d3996831fa419098943e264?AWSAccessK | |
eyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=Uy%2Fsg9rJCzAcSgSLgNJjCnzPoJw%3D", "checksum"=>"4e8c4dd | |
49d3996831fa419098943e264", "path"=>"recipes/default.rb", "specificity"=>"default"}, {"name"=>"server.rb", "ur | |
l"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/c | |
hecksum-6e96fc65285000fbc04801b8b920dfe8?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=pI6n | |
iNhRZAOfhTkK7MOKAKAcDBY%3D", "checksum"=>"6e96fc65285000fbc04801b8b920dfe8", "path"=>"recipes/server.rb", "spe | |
cificity"=>"default"}], "root_files"=>[{"name"=>"metadata.json", "url"=>"https://s3.amazonaws.com/opscode-plat | |
form-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-07fd620a1cdc16d7949df298d1302093?A | |
WSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=0nwHAGurRvUFE9u12Zb62nrxncU%3D", "checksum"=>" | |
07fd620a1cdc16d7949df298d1302093", "path"=>"metadata.json", "specificity"=>"default"}, {"name"=>"metadata.rb", | |
"url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98 | |
d8/checksum-67f100703d5232d93f805c7d26e463b3?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature= | |
efgPuhiNvwGmlfwfDCSRkzHFoi0%3D", "checksum"=>"67f100703d5232d93f805c7d26e463b3", "path"=>"metadata.rb", "speci | |
ficity"=>"default"}, {"name"=>"README.md", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/o | |
rganization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-a28df86fd2692d11cb93507571e22b77?AWSAccessKeyId=AKIAJOZT | |
D2N26S7W6APA&Expires=1329588248&Signature=pSUnexTehzTMFfQyj1v5ls79WYI%3D", "checksum"=>"a28df86fd2692d11cb9350 | |
7571e22b77", "path"=>"README.md", "specificity"=>"default"}], "frozen?"=>false, "chef_type"=>"cookbook_version | |
"}, @file_vendor=nil, @metadata=#<Chef::Cookbook::Metadata:0x2d3e7a8 @cookbook=nil, @name="sql_server", @long_ | |
description="Description\n===========\n\nInstalls and configures Microsoft SQL Server 2008 R2 server and clien | |
t. By default the Express edition is installed, but the `sql_server::server` recipe supports installation of | |
other editions (see __Usage__ below).\n\nRequirements\n============\n\nPlatform\n--------\n\nTested on\n\n* Wi | |
ndows Server 2008 R2\n\nMay work on other versions of Windows.\n\nAttributes\n==========\n\ndefault\n-------\n | |
\nThe following attributes are used by both client and server recipes.\n\n* `node['sql_server']['accept_eula'] | |
` - indicate that you accept the terms of the end user license, default is 'false'\n* `node['sql_server']['pro | |
duct_key']` - Specifies the product key for the edition of SQL Server, default is `nil` (not needed for SQL Se | |
rver 2008 R2 Express installs)\n\nclient\n------\n\nThis file also contains download url, checksum and package | |
name for all client installation packages. See the __Usage__ section below for more details.\n\nserver\n---- | |
--\n\n* `node['sql_server']['install_dir']` - main directory for installation, default is `C:\\Program Files\\ | |
Microsoft SQL Server`\n* `node['sql_server']['port']` - static TCP port server should listen on for client con | |
nections, default is `1433`\n* `node['sql_server']['instance_name']` - name of the default instance, default i | |
s `SQLEXPRESS`\n* `node['sql_server']['instance_dir']` - root directory of the default instance, default is `C | |
:\\Program Files\\Microsoft SQL Server`\n\nThis file also contains download url, checksum and package name for | |
the server installation package.\n\nUsage\n=====\n\ndefault\n-------\n\nIncludes the `sql_server::client` rec | |
ipe.\n\nclient\n------\n\nInstalls required the SQL Server Native Client and all required dependancies. These | |
include:\n\n* [Microsoft SQL Server 2008 R2 Native Client](http://www.microsoft.com/download/en/details.aspx?i | |
d=16978#SNAC)\n* [Microsoft SQL Server 2008 R2 Command Line Utilities (ie `sqlcmd`)](http://www.microsoft.com/ | |
download/en/details.aspx?id=16978#SQLCMD)\n* [Microsoft SQL Server System CLR Types](http://www.microsoft.com/ | |
download/en/details.aspx?id=16978#SQLSYSCLR)\n* [Microsoft SQL Server 2008 R2 Management Objects](http://www.m | |
icrosoft.com/download/en/details.aspx?id=16978#SMO)\n* [Windows PowerShell Extensions for SQL Server 2008 R2]( | |
http://www.microsoft.com/download/en/details.aspx?id=16978#PowerShell)\n\nThe SQL Server Native Client contain | |
s the SQL Server ODBC driver and the SQL Server OLE DB provider in one native dynamic link library (DLL) suppo | |
rting applications using native-code APIs (ODBC, OLE DB and ADO) to Microsoft SQL Server. In simple terms the | |
se packages should allow any other node to act as a client of a SQL Server instance.\n\nThe [TinyTDS](https:// | |
github.com/rails-sqlserver/tiny_tds) gem is also installed as this is used in the SQL Server providers for the | |
`database` and `database_user` resources (see the `database` cookbook for more details).\n\nserver\n------\n\ | |
nInstalls SQL Server 2008 R2 Express. The installation is done using the `windows_package` resource and [Conf | |
igurationFile](http://msdn.microsoft.com/en-us/library/dd239405.aspx) generated from a `template` resource. T | |
he installation is slightly opinionated and does the following:\n\n* Enables [Mixed Mode](http://msdn.microsof | |
t.com/en-us/library/aa905171\\(v=sql.80\\).aspx) (Windows Authentication and SQL Server Authentication) authen | |
tication\n* Auto-generates and sets a strong password for the 'sa' account\n* sets a static TCP port which is | |
configurable via an attribute.\n\nInstalling any of the SQL Server server or client packages in an unattended/ | |
automated way requires you to explicitly indicate that you accept the terms of the end user license. The hooks | |
have been added to all recipes to do this via an attribute. Create a role to set the `node['sql_server']['ac | |
cept_license_terms']` attribute to 'true'. For example:\n\n % cat roles/sql_server.rb\n name \"sql_serv | |
er\"\n description \"SQL Server database master\"\n run_list(\n \"recipe[sql_server::server]\"\n | |
)\n default_attributes(\n \"sql_server\" => {\n \"accept_eula\" => true\n }\n )\n\nOut | |
of the box this recipe installs the Express edition of SQL Server 2008 R2. If you would like to install the | |
Standard edition create a role as follows:\n\n % cat roles/sql_server.rb\n name \"sql_server_standard\"\ | |
n description \"SQL Server Stadard edition database master\"\n run_list(\n \"recipe[sql_server::ser | |
ver]\"\n )\n default_attributes(\n \"sql_server\" => {\n \"instance_name\" => \"MSSQLSERVER\ | |
",\n \"product_key\" => \"YOUR_PRODUCT_KEY_HERE\",\n \"accept_eula\" => true,\n \"server\ | |
" => {\n \"url\" => \"DOWNLOAD_LOCATION_OF_INSTALLATION_PACKAGE\",\n \"checksum\" => \"SHA25 | |
6_OF_INSTALLATION_PACKAGE\"\n }\n }\n )\n\nDepending on your base Windows installation you may | |
also need to open the configured static port in the Windows Firewall. In the name of security we do not do th | |
is by default but the follow code should get the job done:\n\n # unlock port in firewall\n # this should | |
leverage firewall_rule resource\n # once COOK-689 is completed\n firewall_rule_name = \"\#{node['sql_se | |
rver']['instance_name']} Static Port\"\n\n execute \"open-static-port\" do\n command \"netsh advfirewa | |
ll firewall add rule name=\\\"\#{firewall_rule_name}\\\" dir=in action=allow protocol=TCP localport=\#{node['s | |
ql_server']['port']}\"\n returns [0,1,42] # *sigh* cmd.exe return codes are wonky\n not_if { SqlServ | |
er::Helper.firewall_rule_enabled?(firewall_rule_name) }\n end\n\nChanges/Roadmap\n===============\n\n## Fut | |
ure\n\n* license distribution and management\n* multi instance support (via an LWRP)\n* clustering support\n\n | |
## 1.0.4:\n\n* bump windows cookbook dependency version to pick up Ruby 1.9 compat fixes\n\n## 1.0.2:\n\n* [CO | |
OK-773] win_friendly_path is no longer a module_function\n* rename accept_license_terms attribute to accept_eu | |
la for consistency with other cookbooks like iis\n\n## 1.0.0:\n\n* [COOK-681] initial release\n\nLicense and A | |
uthor\n==================\n\nAuthor:: Seth Chisamore (<schisamo@opscode.com>)\n\nCopyright:: 2011, Opscode, In | |
c.\n\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in c | |
ompliance with the License.\nYou may obtain a copy of the License at\n\n http://www.apache.org/licenses/LIC | |
ENSE-2.0\n\nUnless required by applicable law or agreed to in writing, software\ndistributed under the License | |
is distributed on an \"AS IS\" BASIS,\nWITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implie | |
d.\nSee the License for the specific language governing permissions and\nlimitations under the License.\n", @m | |
aintainer="Opscode, Inc.", @maintainer_email="cookbooks@opscode.com", @license="Apache 2.0", @description="Ins | |
talls/Configures Microsoft SQL Server 2008 R2", @platforms={"windows"=>">= 0.0.0"}, @dependencies={"windows"=> | |
">= 1.2.6", "openssl"=>">= 0.0.0"}, @recommendations={}, @suggestions={}, @conflicting={}, @providing={"sql_se | |
rver"=>">= 0.0.0", "sql_server::server"=>">= 0.0.0", "sql_server::client"=>">= 0.0.0"}, @replacing={}, @attrib | |
utes={}, @groupings={}, @recipes={"sql_server"=>"", "sql_server::server"=>"", "sql_server::client"=>""}, @vers | |
ion="1.0.4">, @checksums={"395e4cda614b462b151de31f384a4cb1"=>nil, "4e8c4dd49d3996831fa419098943e264"=>nil, "6 | |
e96fc65285000fbc04801b8b920dfe8"=>nil, "5f9fc3142e6965f2aca8bca763d170ed"=>nil, "0dad586b72c47622851e9f163aad5 | |
1ed"=>nil, "41bfed5c92529a2ddd6141342f4e21cd"=>nil, "c05f7b6b32109edbc16b4ec21c47be1f"=>nil, "49d6eb820a2e2ca8 | |
069c834326d04aac"=>nil, "48df9f4d2475994d70b79f24d695c7f4"=>nil, "07fd620a1cdc16d7949df298d1302093"=>nil, "67f | |
100703d5232d93f805c7d26e463b3"=>nil, "a28df86fd2692d11cb93507571e22b77"=>nil}, @manifest_records_by_path={"rec | |
ipes/client.rb"=>{"name"=>"client.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organ | |
ization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-395e4cda614b462b151de31f384a4cb1?AWSAccessKeyId=AKIAJOZTD2N2 | |
6S7W6APA&Expires=1329588248&Signature=uBcBhcD7D6bvaNSEXar7dZoOuiI%3D", "checksum"=>"395e4cda614b462b151de31f38 | |
4a4cb1", "path"=>"recipes/client.rb", "specificity"=>"default"}, "recipes/default.rb"=>{"name"=>"default.rb", | |
"url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d | |
8/checksum-4e8c4dd49d3996831fa419098943e264?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=U | |
y%2Fsg9rJCzAcSgSLgNJjCnzPoJw%3D", "checksum"=>"4e8c4dd49d3996831fa419098943e264", "path"=>"recipes/default.rb" | |
, "specificity"=>"default"}, "recipes/server.rb"=>{"name"=>"server.rb", "url"=>"https://s3.amazonaws.com/opsco | |
de-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-6e96fc65285000fbc04801b8b92 | |
0dfe8?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=pI6niNhRZAOfhTkK7MOKAKAcDBY%3D", "check | |
sum"=>"6e96fc65285000fbc04801b8b920dfe8", "path"=>"recipes/server.rb", "specificity"=>"default"}, "libraries/h | |
elper.rb"=>{"name"=>"helper.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organizatio | |
n-5beb2e18f5854d1a90067d55bcbe98d8/checksum-5f9fc3142e6965f2aca8bca763d170ed?AWSAccessKeyId=AKIAJOZTD2N26S7W6A | |
PA&Expires=1329588248&Signature=gQbZYplhAQQ92QCfkHFld8SsI9g%3D", "checksum"=>"5f9fc3142e6965f2aca8bca763d170ed | |
", "path"=>"libraries/helper.rb", "specificity"=>"default"}, "attributes/client.rb"=>{"name"=>"client.rb", "ur | |
l"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/c | |
hecksum-0dad586b72c47622851e9f163aad51ed?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=bqVZ | |
xNW22pKKESuc0Kf9hVDnAhU%3D", "checksum"=>"0dad586b72c47622851e9f163aad51ed", "path"=>"attributes/client.rb", " | |
specificity"=>"default"}, "attributes/default.rb"=>{"name"=>"default.rb", "url"=>"https://s3.amazonaws.com/ops | |
code-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-41bfed5c92529a2ddd6141342 | |
f4e21cd?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=sNZ7Sj271gIw5eGeAZs5iOQ6HBg%3D", "che | |
cksum"=>"41bfed5c92529a2ddd6141342f4e21cd", "path"=>"attributes/default.rb", "specificity"=>"default"}, "attri | |
butes/server.rb"=>{"name"=>"server.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/orga | |
nization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-c05f7b6b32109edbc16b4ec21c47be1f?AWSAccessKeyId=AKIAJOZTD2N | |
26S7W6APA&Expires=1329588248&Signature=SW9sc%2FkAY0fGTHyB%2BHFTmJNouS4%3D", "checksum"=>"c05f7b6b32109edbc16b4 | |
ec21c47be1f", "path"=>"attributes/server.rb", "specificity"=>"default"}, "templates/default/ConfigurationFile. | |
ini.erb"=>{"name"=>"ConfigurationFile.ini.erb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-d | |
ata/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-49d6eb820a2e2ca8069c834326d04aac?AWSAccessKeyId=AKI | |
AJOZTD2N26S7W6APA&Expires=1329588248&Signature=1wHxEeNrVXtltRARhCERf5i%2BWLU%3D", "checksum"=>"49d6eb820a2e2ca | |
8069c834326d04aac", "path"=>"templates/default/ConfigurationFile.ini.erb", "specificity"=>"default"}, "templat | |
es/default/restart.rb.erb"=>{"name"=>"restart.rb.erb", "url"=>"https://s3.amazonaws.com/opscode-platform-produ | |
ction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-48df9f4d2475994d70b79f24d695c7f4?AWSAccessKe | |
yId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=DDSK9ApXBd1fuuyoqylQXuNaNm4%3D", "checksum"=>"48df9f4d24 | |
75994d70b79f24d695c7f4", "path"=>"templates/default/restart.rb.erb", "specificity"=>"default"}, "metadata.json | |
"=>{"name"=>"metadata.json", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5b | |
eb2e18f5854d1a90067d55bcbe98d8/checksum-07fd620a1cdc16d7949df298d1302093?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&E | |
xpires=1329588248&Signature=0nwHAGurRvUFE9u12Zb62nrxncU%3D", "checksum"=>"07fd620a1cdc16d7949df298d1302093", " | |
path"=>"metadata.json", "specificity"=>"default"}, "metadata.rb"=>{"name"=>"metadata.rb", "url"=>"https://s3.a | |
mazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-67f100703 | |
d5232d93f805c7d26e463b3?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=efgPuhiNvwGmlfwfDCSRk | |
zHFoi0%3D", "checksum"=>"67f100703d5232d93f805c7d26e463b3", "path"=>"metadata.rb", "specificity"=>"default"}, | |
"README.md"=>{"name"=>"README.md", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organizat | |
ion-5beb2e18f5854d1a90067d55bcbe98d8/checksum-a28df86fd2692d11cb93507571e22b77?AWSAccessKeyId=AKIAJOZTD2N26S7W | |
6APA&Expires=1329588248&Signature=pSUnexTehzTMFfQyj1v5ls79WYI%3D", "checksum"=>"a28df86fd2692d11cb93507571e22b | |
77", "path"=>"README.md", "specificity"=>"default"}}, @attribute_filenames_by_short_filename={"client"=>"clien | |
t.rb", "default"=>"default.rb", "server"=>"server.rb"}>, "windows"=>#<Chef::CookbookVersion:0x2d2bf68 @name="w | |
indows", @frozen=false, @attribute_filenames=["default.rb"], @definition_filenames=[], @template_filenames=[], | |
@file_filenames=["handlers/windows_reboot_handler.rb"], @recipe_filenames=["default.rb", "reboot_handler.rb"] | |
, @recipe_filenames_by_name={"default"=>"default.rb", "reboot_handler"=>"reboot_handler.rb"}, @library_filenam | |
es=["feature_base.rb", "registry_helper.rb", "helper.rb", "windows_privileged.rb", "version.rb", "ruby_19_patc | |
hes.rb"], @resource_filenames=["zipfile.rb", "package.rb", "registry.rb", "auto_run.rb", "reboot.rb", "path.rb | |
", "batch.rb", "feature.rb"], @provider_filenames=["registry.rb", "auto_run.rb", "path.rb", "feature_serverman | |
agercmd.rb", "zipfile.rb", "package.rb", "batch.rb", "feature_dism.rb", "reboot.rb"], @metadata_filenames=[], | |
@root_dir=nil, @root_filenames=["README.md", "metadata.rb", "metadata.json"], @couchdb_id=nil, @couchdb=#<Chef | |
::CouchDB:0x2d2be48 @db="chef", @rest=#<Chef::REST:0x2d2be30 @url="http://localhost:5984", @cookies={}, @defau | |
lt_headers={}, @auth_credentials=#<Chef::REST::AuthCredentials:0x2d2bde8 @key_file=nil, @client_name=nil>, @si | |
gn_request=true, @sign_on_redirect=true, @redirects_followed=0, @redirect_limit=10>>, @couchdb_rev=nil, @statu | |
s=:ready, @manifest={"definitions"=>[], "name"=>"windows-1.2.10", "files"=>[{"name"=>"handlers/windows_reboot_ | |
handler.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90 | |
067d55bcbe98d8/checksum-79a76ab34126d1e28c62c4f070b10dc9?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=132958824 | |
8&Signature=Pzy4Mt%2FQiuUuWp1prLr0o8jpgGQ%3D", "checksum"=>"79a76ab34126d1e28c62c4f070b10dc9", "path"=>"files/ | |
default/handlers/windows_reboot_handler.rb", "specificity"=>"default"}], "attributes"=>[{"name"=>"default.rb", | |
"url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98 | |
d8/checksum-eda001f275230230125ff1c8dbcd01af?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature= | |
Dk%2BTtSA2bjxDl0sVU4zJUrZnfpE%3D", "checksum"=>"eda001f275230230125ff1c8dbcd01af", "path"=>"attributes/default | |
.rb", "specificity"=>"default"}], "json_class"=>"Chef::CookbookVersion", "providers"=>[{"name"=>"registry.rb", | |
"url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98 | |
d8/checksum-2c46e31754b7e949a5857e2957bbc255?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature= | |
DqYKUVvu%2FlJBgqSDgXV%2B5I0LL2Q%3D", "checksum"=>"2c46e31754b7e949a5857e2957bbc255", "path"=>"providers/regist | |
ry.rb", "specificity"=>"default"}, {"name"=>"auto_run.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-p | |
roduction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-f52bafb5e9ce97d2a7258445b6b56406?AWSAcce | |
ssKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=a1l8JU0thZ%2BzJSOPi5KjODH5HUU%3D", "checksum"=>"f52b | |
afb5e9ce97d2a7258445b6b56406", "path"=>"providers/auto_run.rb", "specificity"=>"default"}, {"name"=>"path.rb", | |
"url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98 | |
d8/checksum-271dba97116e58581ea4c650386dd8f3?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature= | |
PnG8iJNzgPFoOWGHrfZrUreMHLo%3D", "checksum"=>"271dba97116e58581ea4c650386dd8f3", "path"=>"providers/path.rb", | |
"specificity"=>"default"}, {"name"=>"feature_servermanagercmd.rb", "url"=>"https://s3.amazonaws.com/opscode-pl | |
atform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-e58459cdaff6ef1bafb9fae64dffcc86 | |
?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=etgh%2B0ptFnOwNfiW9sFopDqN7a4%3D", "checksum | |
"=>"e58459cdaff6ef1bafb9fae64dffcc86", "path"=>"providers/feature_servermanagercmd.rb", "specificity"=>"defaul | |
t"}, {"name"=>"zipfile.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5be | |
b2e18f5854d1a90067d55bcbe98d8/checksum-7859415b67a1db7633695b1acc9704fd?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Ex | |
pires=1329588248&Signature=jkzyZ0b33AWcOr1t5r8ERcVmBg8%3D", "checksum"=>"7859415b67a1db7633695b1acc9704fd", "p | |
ath"=>"providers/zipfile.rb", "specificity"=>"default"}, {"name"=>"package.rb", "url"=>"https://s3.amazonaws.c | |
om/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-6aca1c8d5a8ad48c260 | |
e264f598e9bb4?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=EDnAPMUn1Ox88EY7Q4VB0Ll55W8%3D" | |
, "checksum"=>"6aca1c8d5a8ad48c260e264f598e9bb4", "path"=>"providers/package.rb", "specificity"=>"default"}, { | |
"name"=>"batch.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f58 | |
54d1a90067d55bcbe98d8/checksum-4b487ea5f4b20a2b17c761badcc55cfa?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=13 | |
29588248&Signature=1rKmNBsU%2FB50BxYzobpAIQYXBAQ%3D", "checksum"=>"4b487ea5f4b20a2b17c761badcc55cfa", "path"=> | |
"providers/batch.rb", "specificity"=>"default"}, {"name"=>"feature_dism.rb", "url"=>"https://s3.amazonaws.com/ | |
opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-706f2a6b16ed14193e45c3 | |
016a71a0c5?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=NYNHRzg20otEnu9PqfCRYrz96DE%3D", " | |
checksum"=>"706f2a6b16ed14193e45c3016a71a0c5", "path"=>"providers/feature_dism.rb", "specificity"=>"default"}, | |
{"name"=>"reboot.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18 | |
f5854d1a90067d55bcbe98d8/checksum-aa71d112a4856c8aaf422c7e8503e971?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires | |
=1329588248&Signature=RyoSysJRgZ3kD3VRmpFo0XhifJ4%3D", "checksum"=>"aa71d112a4856c8aaf422c7e8503e971", "path"= | |
>"providers/reboot.rb", "specificity"=>"default"}], "metadata"=>{"name"=>"windows", "description"=>"Provides a | |
set of useful Windows-specific primitives.", "long_description"=>"Description\n===========\n\nProvides a set | |
of Windows-specific primitives (Chef resources) meant to aid in the creation of cookbooks/recipes targeting th | |
e Windows platform.\n\nRequirements\n============\n\nPlatform\n--------\n\n* Windows XP\n* Windows Vista\n* Wi | |
ndows Server 2003 R2\n* Windows 7\n* Windows Server 2008 (R1, R2)\n\nCookbooks\n---------\n\n* chef_handler (` | |
windows::reboot_handler` leverages the chef_handler LWRP)\n\nAttributes\n==========\n\n* `node['windows']['all | |
ow_pending_reboots']` - used to configure the `WindowsRebootHandler` (via the `windows::reboot_handler` recipe | |
) to act on pending reboots. default is true (ie act on pending reboots). The value of this attribute only ha | |
s an effect if the `windows::reboot_handler` is in a node's run list.\n\nResource/Provider\n=================\ | |
n\nwindows\\_auto\\_run\n------------------\n\n### Actions\n- :create: Create an item to be run at login\n- :r | |
emove: Remove an item that was previously setup to run at login\n\n### Attribute Parameters\n- :name: Name att | |
ribute. The name of the value to be stored in the registry\n- :program: The program to be run at login\n- :arg | |
s: The arguments for the program\n\n### Examples\n\n # Run BGInfo at login\n windows_auto_run 'BGINFO' do\n | |
program \"C:/Sysinternals/bginfo.exe\"\n args \"\\\"C:/Sysinternals/Config.bgi\\\" /NOLICPROMPT /TIMER:0 | |
\"\n not_if { Registry.value_exists?(AUTO_RUN_KEY, 'BGINFO') }\n action :create\n end\n\n\nwindows\\_ba | |
tch\n--------------\nExecute a batch script using the cmd.exe interpreter (much like the script resources for | |
bash, csh, powershell, perl, python and ruby). A temporary file is created and executed like other script reso | |
urces, rather than run inline. By their nature, Script resources are not idempotent, as they are completely up | |
to the user's imagination. Use the `not_if` or `only_if` meta parameters to guard the resource for idempotenc | |
e.\n\n### Actions\n\n- :run: run the batch file\n\n### Attribute Parameters\n\n- command: name attribute. Name | |
of the command to execute.\n- code: quoted string of code to execute.\n- creates: a file this command creates | |
- if the file exists, the command will not be run.\n- cwd: current working directory to run the command from. | |
\n- flags: command line flags to pass to the interpreter when invoking.\n- user: A user name or user ID that w | |
e should change to before running this command.\n- group: A group name or group ID that we should change to be | |
fore running this command.\n\n### Examples\n\n windows_batch \"unzip_and_move_ruby\" do\n code <<-EOH\ | |
n 7z.exe x \#{Chef::Config[:file_cache_path]}/ruby-1.8.7-p352-i386-mingw32.7z -oC:\\\\source -r -y\n | |
xcopy C:\\\\source\\\\ruby-1.8.7-p352-i386-mingw32 C:\\\\ruby /e /y\n EOH\n end\n\n windows_batch | |
\"echo some env vars\" do\n code <<-EOH\n echo %TEMP%\n echo %SYSTEMDRIVE%\n echo %PATH%\ | |
n echo %WINDIR%\n EOH\n end\n\n\nwindows\\_feature\n----------------\n\nWindows Roles and Feature | |
s can be thought of as built-in operating system packages that ship with the OS. A server role is a set of so | |
ftware programs that, when they are installed and properly configured, lets a computer perform a specific func | |
tion for multiple users or other computers within a network. A Role can have multiple Role Services that prov | |
ide functionality to the Role. Role services are software programs that provide the functionality of a role. | |
Features are software programs that, although they are not directly parts of roles, can support or augment the | |
functionality of one or more roles, or improve the functionality of the server, regardless of which roles are | |
installed. Collectively we refer to all of these attributes as 'features'.\n\nThis resource allows you to ma | |
nage these 'features' in an unattended, idempotent way.\n\nThere are two providers for the `windows_features` | |
which map into Microsoft's two major tools for managing roles/features: [Deployment Image Servicing and Manage | |
ment (DISM)](http://msdn.microsoft.com/en-us/library/dd371719(v=vs.85).aspx) and [Servermanagercmd](http://tec | |
hnet.microsoft.com/en-us/library/ee344834(WS.10).aspx) (The CLI for Server Manager). As Servermanagercmd is d | |
eprecated, Chef will set the default provider to `Chef::Provider::WindowsFeature::DISM` if DISM is present on | |
the system being configured. The default provider will fall back to `Chef::Provider::WindowsFeature::ServerMa | |
nagerCmd`.\n\nFor more information on Roles, Role Services and Features see the [Microsoft TechNet article on | |
the topic](http://technet.microsoft.com/en-us/library/cc754923.aspx). For a complete list of all features tha | |
t are available on a node type either of the following commands at a command prompt:\n\n dism /online /Get- | |
Features\n servermanagercmd -query\n\n### Actions\n\n- :install: install a Windows role/feature\n- :remove: | |
remove a Windows role/feature\n\n### Attribute Parameters\n\n- feature_name: name of the feature/role to inst | |
all. The same feature may have different names depending on the provider used (ie DHCPServer vs DHCP; DNS-Ser | |
ver-Full-Role vs DNS).\n\n### Providers\n\n- **Chef::Provider::WindowsFeature::DISM**: Uses Deployment Image S | |
ervicing and Management (DISM) to manage roles/features.\n- **Chef::Provider::WindowsFeature::ServerManagerCmd | |
**: Uses Server Manager to manage roles/features.\n\n### Examples\n\n # enable the node as a DHCP Server\n | |
windows_feature \"DHCPServer\" do\n action :install\n end\n\n # enable TFTP\n windows_feature | |
\"TFTP\" do\n action :install\n end\n\n # disable Telnet client/server\n %w{ TelnetServer Telne | |
tClient }.each do |feature|\n windows_feature feature do\n action :remove\n end\n end\n\n | |
#\n\nwindows\\_package\n----------------\n\nManage Windows application packages in an unattended, idempoten | |
t way.\n\nThe following application installers are currently supported:\n\n* MSI packages\n* InstallShield\n* | |
Wise InstallMaster\n* Inno Setup\n* Nullsoft Scriptable Install System\n\nIf the proper installer type is not | |
passed into the resource's installer_type attribute, the provider will do it's best to identify the type by in | |
trospecting the installation package. If the installation type cannot be properly identified the `:custom` va | |
lue can be passed into the installer_type attribute along with the proper flags for silent/quiet installation | |
(using the `options` attribute..see example below).\n\n__PLEASE NOTE__ - For proper idempotence the resource's | |
`package_name` should be the same as the 'DisplayName' registry value in the uninstallation data that is crea | |
ted during package installation. The easiest way to definitively find the proper 'DisplayName' value is to in | |
stall the package on a machine and search for the uninstall information under the following registry keys:\n\n | |
* `HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Uninstall`\n* `HKEY_CURRENT_USER\\Softwar | |
e\\Microsoft\\Windows\\CurrentVersion\\Uninstall`\n* `HKEY_LOCAL_MACHINE\\Software\\Wow6464Node\\Microsoft\\Wi | |
ndows\\CurrentVersion\\Uninstall`\n\nFor maximum flexibility the `source` attribute supports both remote and l | |
ocal installation packages.\n\n### Actions\n\n- :install: install a package\n- :remove: remove a package. The | |
remove action is completely hit or miss as many application uninstallers do not support a full silent/quiet mo | |
de.\n\n### Attribute Parameters\n\n- package_name: name attribute. The 'DisplayName' of the application instal | |
lation package.\n- source: The source of the windows installer. This can either be a URI or a local path.\n- | |
installer_type: They type of windows installation package. valid values are: :msi, :inno, :nsis, :wise, :insta | |
llshield, :custom. If this value is not provided, the provider will do it's best to identify the installer ty | |
pe through introspection of the file.\n- checksum: useful if source is remote, the SHA-256 checksum of the fil | |
e--if the local file matches the checksum, Chef will not download it\n- options: Additional options to pass th | |
e underlying installation command\n\n### Examples\n\n # install PuTTY (InnoSetup installer)\n windows_pa | |
ckage \"PuTTY version 0.60\" do\n source \"http://the.earth.li/~sgtatham/putty/latest/x86/putty-0.60-inst | |
aller.exe\"\n installer_type :inno\n action :install\n end\n\n # install 7-Zip (MSI installer) | |
\n windows_package \"7-Zip 9.20 (x64 edition)\" do\n source \"http://downloads.sourceforge.net/sevenzi | |
p/7z920-x64.msi\"\n action :install\n end\n\n # install Notepad++ (Y U No Emacs?) using a local ins | |
taller\n windows_package \"Notepad++\" do\n source \"c:/installation_files/npp.5.9.2.Installer.exe\"\n | |
action :install\n end\n\n # install VLC for that Xvid (NSIS installer)\n windows_package \"VLC | |
media player 1.1.10\" do\n source \"http://superb-sea2.dl.sourceforge.net/project/vlc/1.1.10/win32/vlc-1. | |
1.10-win32.exe\"\n action :install\n end\n\n # install Firefox as custom installer and manually set | |
the silent install flags\n windows_package \"Mozilla Firefox 5.0 (x86 en-US)\" do\n source \"http://a | |
rchive.mozilla.org/pub/mozilla.org/mozilla.org/firefox/releases/5.0/win32/en-US/Firefox%20Setup%205.0.exe\"\n | |
options \"-ms\"\n installer_type :custom\n action :install\n end\n\n # Google Chrome FTW | |
(MSI installer)\n windows_package \"Google Chrome\" do\n source \"https://dl-ssl.google.com/tag/s/appg | |
uid%3D%7B8A69D345-D564-463C-AFF1-A69D9E530F96%7D%26iid%3D%7B806F36C0-CB54-4A84-A3F3-0CF8A86575E0%7D%26lang%3De | |
n%26browser%3D3%26usagestats%3D0%26appname%3DGoogle%2520Chrome%26needsadmin%3Dfalse/edgedl/chrome/install/Goog | |
leChromeStandaloneEnterprise.msi\"\n action :install\n end\n\n # remove Google Chrome (but why??)\n | |
windows_package \"Google Chrome\" do\n action :remove\n end\n\n # remove 7-Zip\n windows_pac | |
kage \"7-Zip 9.20 (x64 edition)\" do\n action :remove\n end\n\n\nwindows\\_reboot\n---------------\n\n | |
Sets required data in the node's run_state to notify `WindowsRebootHandler` a reboot is requested. If Chef ru | |
n completes successfully a reboot will occur if the `WindowsRebootHandler` is properly registered as a report | |
handler. As an action of `:request` will cause a node to reboot every Chef run, this resource is usually noti | |
fied by other resources...ie restart node after a package is installed (see example below).\n\n### Actions\n- | |
:request: requests a reboot at completion of successful Cher run. requires `WindowsRebootHandler` to be regis | |
tered as a report handler.\n- :cancel: remove reboot request from node.run_state. this will cancel *ALL* prev | |
iously requested reboots as this is a binary state.\n\n### Attribute Parameters\n- :timeout: Name attribute. t | |
imeout delay in seconds to wait before proceeding with the requested reboot. default is 60 seconds\n- :reason: | |
comment on the reason for the reboot. default is 'Opscode Chef initiated reboot'\n\n### Examples\n\n # if | |
the package installs, schedule a reboot at end of chef run\n windows_reboot 60 do\n reason 'cause chef | |
said so'\n action :nothing\n end\n windows_package 'some_package' do\n action :install\n | |
notifies :request, 'windows_reboot[60]'\n end\n\n # cancel the previously requested reboot\n windows | |
_reboot 60 do\n action :cancel\n end\n\nwindows\\_registry\n-----------------\n\nCreates and modifies | |
Windows registry keys.\n\n### Actions\n\n- :create: create a new registry key with the provided values.\n- :mo | |
dify: modify an existing registry key with the provided values.\n- :force_modify: modify an existing registry | |
key with the provided values. ensures the value is actually set by checking multiple times. useful for fighti | |
ng race conditions where two processes are trying to set the same registry key. This will be updated in the n | |
ear future to use 'RegNotifyChangeKeyValue' which is exposed by the WinAPI and allows a process to register fo | |
r notification on a registry key change.\n- :remove: removes a value from an existing registry key\n\n### Attr | |
ibute Parameters\n\n- key_name: name attribute. The registry key to create/modify.\n- values: hash of the valu | |
es to set under the registry key. The individual hash items will become respective 'Value name' => 'Value data | |
' items in the registry key.\n- type: Type of key to create, currently only used for :binary to create `REG_BI | |
NARY` registry keys. Must be a symbol. See __Roadmap__ for future plans.\n\n### Examples\n\n # make the loc | |
al windows proxy match the one set for Chef\n proxy = URI.parse(Chef::Config[:http_proxy])\n windows_reg | |
istry 'HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings' do\n values 'ProxyEnable' = | |
> 1, 'ProxyServer' => \"\#{proxy.host}:\#{proxy.port}\", 'ProxyOverride' => '<local>'\n end\n\n # enable | |
Remote Desktop and poke the firewall hole\n windows_registry 'HKLM\\SYSTEM\\CurrentControlSet\\Control\\Te | |
rminal Server' do\n values 'FdenyTSConnections' => 0\n end\n\n # Delete an item from the registry\n | |
windows_registry 'HKCU\\Software\\Test' do\n #Key is the name of the value that you want to delete th | |
e value is always empty\n values 'ValueToDelete' => ''\n action :remove\n end\n\n### Library Meth | |
ods\n\n Registry.value_exists?('HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run','BGINFO')\n Reg | |
istry.key_exists?('HKLM\\SOFTWARE\\Microsoft')\n BgInfo = Registry.get_value('HKLM\\SOFTWARE\\Microsoft\\Wi | |
ndows\\CurrentVersion\\Run','BGINFO')\n\n\nwindows\\_path\n-------------\n\n### Actions\n- :add: Add an item t | |
o the system path\n\n### Attribute Parameters\n- :path: Name attribute. The name of the value to add to the sy | |
stem path\n\n### Examples\n\n #Add Sysinternals to the system path\n windows_path 'C:\\Sysinternals' do\ | |
n action :add\n end\n\n\nwindows\\_zipfile\n----------------\n\nMost version of Windows do not ship wi | |
th native cli utility for managing compressed files. This resource provides a pure-ruby implementation for ma | |
naging zip files. Be sure to use the `not_if` or `only_if` meta parameters to guard the resource for idempoten | |
ce or action will be taken on the zip file every Chef run.\n\n### Actions\n\n- :unzip: unzip a compressed file | |
\n\n### Attribute Parameters\n\n- path: name attribute. The path where files will be unzipped to.\n- source: T | |
he source of the zip file. This can either be a URI or a local path.\n- overwrite: force an overwrite of the f | |
iles if the already exists.\n\n### Examples\n\n # unzip a remote zip file locally\n windows_zipfile \"c: | |
/bin\" do\n source \"http://download.sysinternals.com/Files/SysinternalsSuite.zip\"\n action :unzip\ | |
n not_if {::File.exists?(\"c:/bin/PsExec.exe\")}\n end\n\n # unzip a local zipfile\n windows_zip | |
file \"c:/the_codez\" do\n source \"c:/foo/baz/the_codez.zip\"\n action :unzip\n end\n\n\nExcepti | |
on/Report Handlers\n=========================\n\nWindowsRebootHandler\n--------------------\n\nRequired reboot | |
s are a necessary evil of configuring and managing Windows nodes. This report handler (ie fires at the end of | |
successful Chef runs) acts on requested (Chef initiated) or pending (as determined by the OS per configuratio | |
n action we performed) reboots. The `allow_pending_reboots` initialization argument should be set to false if | |
you do not want the handler to automatically reboot a node if it has been determined a reboot is pending. Re | |
boots can still be requested explicitly via the `windows_reboot` LWRP.\n\n## Initialization Arguments\n\n- `al | |
low_pending_reboots`: indicator on whether the handler should act on a the Window's 'pending reboot' state. de | |
fault is true\n- `timeout`: timeout delay in seconds to wait before proceeding with the reboot. default is 60 | |
seconds\n- `reason`: comment on the reason for the reboot. default is 'Opscode Chef initiated reboot'\n\nUsag | |
e\n=====\n\nJust place an explicit dependency on this cookbook (using depends in the cookbook's metadata.rb) f | |
rom any cookbook where you would like to use the Windows-specific resources/providers that ship with this cook | |
book.\n\ndefault\n-------\n\nConvenience recipe that installs supporting gems for many of the resources/provid | |
ers that ship with this cookbook.\n\nreboot\\_handler\n--------------\n\nLeverages the `chef_handler` LWRP to | |
register the `WindowsRebootHandler` report handler that ships as part of this cookbook. By default this handle | |
r is set to automatically act on pending reboots. If you would like to change this behavior override `node['w | |
indows']['allow_pending_reboots']` and set the value to false. For example:\n\n % cat roles/base.rb\n n | |
ame \"base\"\n description \"base role\"\n override_attributes(\n \"windows\" => {\n \"allow | |
_pending_reboots\" => false\n }\n )\n\nThis will still allow a reboot to be explicitly requested via t | |
he `windows_reboot` LWRP.\n\nChanges/Roadmap\n===============\n\n## Future\n\n* package preseeding/response_fi | |
le support\n* package installation location via a `target_dir` attribute.\n* [COOK-666] `windows_package` shou | |
ld support CoApp packages\n* windows_registry :force_modify action should use RegNotifyChangeKeyValue from Win | |
API\n* WindowsRebootHandler/`windows_reboot` LWRP should support kicking off subsequent chef run on reboot.\n* | |
Support all types of registry keys with `type` parameter in `windows_registry`.\n\n### v1.2.10\n\n* [COOK-939 | |
] - add `type` parameter to `windows_registry` to allow binary registry keys.\n* [COOK-940] - refactor logic s | |
o multiple values get created.\n\n### v1.2.8\n\n* FIX: Older Windows (Windows Server 2003) sometimes return 12 | |
7 on successful forked commands\n* FIX: `windows_package`, ensure we pass the WOW* registry redirection flags | |
into reg.open\n\n### v1.2.6\n\n* patch to fix [CHEF-2684], Open4 is named Open3 in Ruby 1.9\n* Ruby 1.9's Open | |
3 returns 0 and 42 for successful commands\n* retry keyword can only be used in a rescue block in Ruby 1.9\n\n | |
### v1.2.4\n\n* windows_package - catch Win32::Registry::Error that pops up when searching certain keys\n\n### | |
v1.2.2\n\n* combined numerous helper libarires for easier sharing across libaries/LWRPs\n* renamed Chef::Prov | |
ider::WindowsFeature::Base file to the more descriptive `feature_base.rb`\n* refactored windows_path LWRP\n * | |
:add action should MODIFY the the underlying ENV variable (vs CREATE)\n * deleted greedy :remove action unti | |
l it could be made more idempotent\n* added a windows_batch resource/provider for running batch scripts remote | |
ly\n\n### v1.2.0\n\n* [COOK-745] gracefully handle required server restarts on Windows platform\n * WindowsRe | |
bootHandler for requested and pending reboots\n * windows_reboot LWRP for requesting (receiving notifies) reb | |
oots\n * reboot_handler recipe for enabling WindowsRebootHandler as a report handler\n* [COOK-714] Correct in | |
itialize misspelling\n* RegistryHelper - new `get_values` method which returns all values for a particular key | |
.\n\n### v1.0.8\n\n* [COOK-719] resource/provider for managing windows features\n* [COOK-717] remove `windows_ | |
env_vars` resource as env resource exists in core chef\n* new `Windows::Version` helper class\n* refactored `W | |
indows::Helper` mixin\n\n### v1.0.6\n\n* added `force_modify` action to `windows_registry` resource\n* add `wi | |
n_friendly_path` helper\n* re-purpose default recipe to install useful supporting windows related gems\n\n### | |
v1.0.4\n\n* [COOK-700] new resources and improvements to the `windows_registry` provider (thanks Paul Morton!) | |
\n * Open the registry in the bitednes of the OS\n * Provide convenience methods to check if keys and values | |
exit\n * Provide convenience method for reading registry values\n * NEW - `windows_auto_run` resource/provi | |
der\n * NEW - `windows_env_vars` resource/provider\n * NEW - `windows_path` resource/provider\n* re-write of | |
the windows_package logic for determining current installed packages\n* new checksum attribute for windows_pa | |
ckage resource...useful for remote packages\n\n### v1.0.2:\n\n* [COOK-647] account for Wow6432Node registry re | |
directer\n* [COOK-656] begin/rescue on win32/registry\n\n### 1.0.0:\n\n* [COOK-612] initial release\n\nLicense | |
and Author\n==================\n\nAuthor:: Seth Chisamore (<schisamo@opscode.com>)\nAuthor:: Doug MacEachern | |
(<dougm@vmware.com>)\nAuthor:: Paul Morton (<pmorton@biaprotect.com>)\n\nCopyright:: 2011, Opscode, Inc.\nCopy | |
right:: 2010, VMware, Inc.\nCopyright:: 2011, Business Intelligence Associates, Inc\n\n\nLicensed under the Ap | |
ache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License. | |
\nYou may obtain a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\nUnless required | |
by applicable law or agreed to in writing, software\ndistributed under the License is distributed on an \"AS | |
IS\" BASIS,\nWITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\nSee the License for the | |
specific language governing permissions and\nlimitations under the License.\n", "maintainer"=>"Opscode, Inc." | |
, "maintainer_email"=>"cookbooks@opscode.com", "license"=>"Apache 2.0", "platforms"=>{"windows"=>">= 0.0.0"}, | |
"dependencies"=>{"chef_handler"=>">= 0.0.0"}, "recommendations"=>{}, "suggestions"=>{}, "conflicting"=>{}, "pr | |
oviding"=>{"windows"=>">= 0.0.0", "windows::reboot_handler"=>">= 0.0.0"}, "replacing"=>{}, "attributes"=>{}, " | |
groupings"=>{}, "recipes"=>{"windows"=>"", "windows::reboot_handler"=>""}, "version"=>"1.2.10"}, "templates"=> | |
[], "resources"=>[{"name"=>"zipfile.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/org | |
anization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-f96479910ab96b5f06315c0ca0b302a4?AWSAccessKeyId=AKIAJOZTD2 | |
N26S7W6APA&Expires=1329588248&Signature=Qq7hFcs2Yz8CQRt8VCgDL6WYDjA%3D", "checksum"=>"f96479910ab96b5f06315c0c | |
a0b302a4", "path"=>"resources/zipfile.rb", "specificity"=>"default"}, {"name"=>"package.rb", "url"=>"https://s | |
3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-5317f1 | |
7e18e8edf0dbed3b67f2a0487d?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=Kk9pUI3vtbQcttnkjn | |
%2BcDb0j6zM%3D", "checksum"=>"5317f17e18e8edf0dbed3b67f2a0487d", "path"=>"resources/package.rb", "specificity" | |
=>"default"}, {"name"=>"registry.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organi | |
zation-5beb2e18f5854d1a90067d55bcbe98d8/checksum-c58c55315e2898eb773c1bde8d585709?AWSAccessKeyId=AKIAJOZTD2N26 | |
S7W6APA&Expires=1329588248&Signature=3tQ0YT0Th%2Bntah8hm279FJGc800%3D", "checksum"=>"c58c55315e2898eb773c1bde8 | |
d585709", "path"=>"resources/registry.rb", "specificity"=>"default"}, {"name"=>"auto_run.rb", "url"=>"https:// | |
s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-8916c | |
5b22a18c87947dff58b71b974af?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=suXa1WlTvHI0o1TmC | |
DhnkosQZI8%3D", "checksum"=>"8916c5b22a18c87947dff58b71b974af", "path"=>"resources/auto_run.rb", "specificity" | |
=>"default"}, {"name"=>"reboot.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organiza | |
tion-5beb2e18f5854d1a90067d55bcbe98d8/checksum-b8472303b776c2322600a0751c815395?AWSAccessKeyId=AKIAJOZTD2N26S7 | |
W6APA&Expires=1329588248&Signature=%2Fci%2F%2B7kH0CLOaDIwtLpcSVzQpWs%3D", "checksum"=>"b8472303b776c2322600a07 | |
51c815395", "path"=>"resources/reboot.rb", "specificity"=>"default"}, {"name"=>"path.rb", "url"=>"https://s3.a | |
mazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-848bd700c | |
257e846d1011bda420d54e8?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=ds2sh%2B8O02e%2F73vdT | |
zW8QwPTrzA%3D", "checksum"=>"848bd700c257e846d1011bda420d54e8", "path"=>"resources/path.rb", "specificity"=>"d | |
efault"}, {"name"=>"batch.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization- | |
5beb2e18f5854d1a90067d55bcbe98d8/checksum-53fe31b998dfd009d7b8f58fa2380c0c?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA | |
&Expires=1329588248&Signature=7uziTu%2BWkHNxkHjWiqw54AXCSMs%3D", "checksum"=>"53fe31b998dfd009d7b8f58fa2380c0c | |
", "path"=>"resources/batch.rb", "specificity"=>"default"}, {"name"=>"feature.rb", "url"=>"https://s3.amazonaw | |
s.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-60e1a5b1b17dfc60 | |
285fb28fcd3870be?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=UAIlMzAJ%2Bgin%2Bgh9zd9hAvPw | |
gX0%3D", "checksum"=>"60e1a5b1b17dfc60285fb28fcd3870be", "path"=>"resources/feature.rb", "specificity"=>"defau | |
lt"}], "libraries"=>[{"name"=>"feature_base.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production- | |
data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-568fe3411d4a69f1c3c9b32780b24cf7?AWSAccessKeyId=AK | |
IAJOZTD2N26S7W6APA&Expires=1329588248&Signature=qFm%2BeREpTVIBnSFK%2BDKjWfmLpPQ%3D", "checksum"=>"568fe3411d4a | |
69f1c3c9b32780b24cf7", "path"=>"libraries/feature_base.rb", "specificity"=>"default"}, {"name"=>"registry_help | |
er.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d5 | |
5bcbe98d8/checksum-76f502ee18c89d7beb68e7f13ab0e9c0?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Sig | |
nature=7eiaV4gS4XGC8e46twRX7fNUgIc%3D", "checksum"=>"76f502ee18c89d7beb68e7f13ab0e9c0", "path"=>"libraries/reg | |
istry_helper.rb", "specificity"=>"default"}, {"name"=>"helper.rb", "url"=>"https://s3.amazonaws.com/opscode-pl | |
atform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-cead86571eaa50734abbcdfc608025fd | |
?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=nqwmQDawggxfeZRUVxC7Or14nNw%3D", "checksum"= | |
>"cead86571eaa50734abbcdfc608025fd", "path"=>"libraries/helper.rb", "specificity"=>"default"}, {"name"=>"windo | |
ws_privileged.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f585 | |
4d1a90067d55bcbe98d8/checksum-724ecf2579c182dff0f21a92b262256e?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=132 | |
9588248&Signature=nDsYVKjkkl2E%2FrXJSv4vjWjneGY%3D", "checksum"=>"724ecf2579c182dff0f21a92b262256e", "path"=>" | |
libraries/windows_privileged.rb", "specificity"=>"default"}, {"name"=>"version.rb", "url"=>"https://s3.amazona | |
ws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-9b20966748f370b | |
153659189191c3859?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=mpkkFFnwcaYqQwHOZA2AwP30OZc | |
%3D", "checksum"=>"9b20966748f370b153659189191c3859", "path"=>"libraries/version.rb", "specificity"=>"default" | |
}, {"name"=>"ruby_19_patches.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organizati | |
on-5beb2e18f5854d1a90067d55bcbe98d8/checksum-6b1e4d953a821a36e60a3a434783a42b?AWSAccessKeyId=AKIAJOZTD2N26S7W6 | |
APA&Expires=1329588248&Signature=G9RyT4s5spgs4NKsCz36NmjLsSM%3D", "checksum"=>"6b1e4d953a821a36e60a3a434783a42 | |
b", "path"=>"libraries/ruby_19_patches.rb", "specificity"=>"default"}], "cookbook_name"=>"windows", "version"= | |
>"1.2.10", "recipes"=>[{"name"=>"default.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-dat | |
a/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-b8f4746c0dc02ee922751006fa0b9c3f?AWSAccessKeyId=AKIAJ | |
OZTD2N26S7W6APA&Expires=1329588248&Signature=KedGzMRkiQl%2B06ul%2BNZG6X%2BgdvA%3D", "checksum"=>"b8f4746c0dc02 | |
ee922751006fa0b9c3f", "path"=>"recipes/default.rb", "specificity"=>"default"}, {"name"=>"reboot_handler.rb", " | |
url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8 | |
/checksum-a55d8ab514d9d9efae136a872711f80f?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=mI | |
ziC4oaEAS3MdlZ4EHUQMdjOH4%3D", "checksum"=>"a55d8ab514d9d9efae136a872711f80f", "path"=>"recipes/reboot_handler | |
.rb", "specificity"=>"default"}], "root_files"=>[{"name"=>"README.md", "url"=>"https://s3.amazonaws.com/opscod | |
e-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-d00cacbe68f1a7257ca40e0ae892 | |
93d7?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=jNiEbHYq4b%2BVzm6FDiD8n1H7OnU%3D", "chec | |
ksum"=>"d00cacbe68f1a7257ca40e0ae89293d7", "path"=>"README.md", "specificity"=>"default"}, {"name"=>"metadata. | |
rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bc | |
be98d8/checksum-fe5055d81afa103bc3e47692daa2aa9f?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signat | |
ure=6ZJpwHTTJA0R1E6mAls9%2Bb2%2Fw7s%3D", "checksum"=>"fe5055d81afa103bc3e47692daa2aa9f", "path"=>"metadata.rb" | |
, "specificity"=>"default"}, {"name"=>"metadata.json", "url"=>"https://s3.amazonaws.com/opscode-platform-produ | |
ction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-64a0f1e6dafcaa4a5a5077a0dd07a430?AWSAccessKe | |
yId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=%2F910xraF%2FCEOqCZ%2FnNdIsLvNTUU%3D", "checksum"=>"64a0 | |
f1e6dafcaa4a5a5077a0dd07a430", "path"=>"metadata.json", "specificity"=>"default"}], "frozen?"=>false, "chef_ty | |
pe"=>"cookbook_version"}, @file_vendor=nil, @metadata=#<Chef::Cookbook::Metadata:0x2d2b5a8 @cookbook=nil, @nam | |
e="windows", @long_description="Description\n===========\n\nProvides a set of Windows-specific primitives (Che | |
f resources) meant to aid in the creation of cookbooks/recipes targeting the Windows platform.\n\nRequirements | |
\n============\n\nPlatform\n--------\n\n* Windows XP\n* Windows Vista\n* Windows Server 2003 R2\n* Windows 7\n | |
* Windows Server 2008 (R1, R2)\n\nCookbooks\n---------\n\n* chef_handler (`windows::reboot_handler` leverages | |
the chef_handler LWRP)\n\nAttributes\n==========\n\n* `node['windows']['allow_pending_reboots']` - used to con | |
figure the `WindowsRebootHandler` (via the `windows::reboot_handler` recipe) to act on pending reboots. defaul | |
t is true (ie act on pending reboots). The value of this attribute only has an effect if the `windows::reboot | |
_handler` is in a node's run list.\n\nResource/Provider\n=================\n\nwindows\\_auto\\_run\n---------- | |
--------\n\n### Actions\n- :create: Create an item to be run at login\n- :remove: Remove an item that was prev | |
iously setup to run at login\n\n### Attribute Parameters\n- :name: Name attribute. The name of the value to be | |
stored in the registry\n- :program: The program to be run at login\n- :args: The arguments for the program\n\ | |
n### Examples\n\n # Run BGInfo at login\n windows_auto_run 'BGINFO' do\n program \"C:/Sysinternals/bginfo | |
.exe\"\n args \"\\\"C:/Sysinternals/Config.bgi\\\" /NOLICPROMPT /TIMER:0\"\n not_if { Registry.value_exi | |
sts?(AUTO_RUN_KEY, 'BGINFO') }\n action :create\n end\n\n\nwindows\\_batch\n--------------\nExecute a batc | |
h script using the cmd.exe interpreter (much like the script resources for bash, csh, powershell, perl, python | |
and ruby). A temporary file is created and executed like other script resources, rather than run inline. By t | |
heir nature, Script resources are not idempotent, as they are completely up to the user's imagination. Use the | |
`not_if` or `only_if` meta parameters to guard the resource for idempotence.\n\n### Actions\n\n- :run: run th | |
e batch file\n\n### Attribute Parameters\n\n- command: name attribute. Name of the command to execute.\n- code | |
: quoted string of code to execute.\n- creates: a file this command creates - if the file exists, the command | |
will not be run.\n- cwd: current working directory to run the command from.\n- flags: command line flags to pa | |
ss to the interpreter when invoking.\n- user: A user name or user ID that we should change to before running t | |
his command.\n- group: A group name or group ID that we should change to before running this command.\n\n### E | |
xamples\n\n windows_batch \"unzip_and_move_ruby\" do\n code <<-EOH\n 7z.exe x \#{Chef::Config[:fi | |
le_cache_path]}/ruby-1.8.7-p352-i386-mingw32.7z -oC:\\\\source -r -y\n xcopy C:\\\\source\\\\ruby-1.8.7- | |
p352-i386-mingw32 C:\\\\ruby /e /y\n EOH\n end\n\n windows_batch \"echo some env vars\" do\n c | |
ode <<-EOH\n echo %TEMP%\n echo %SYSTEMDRIVE%\n echo %PATH%\n echo %WINDIR%\n EOH\n | |
end\n\n\nwindows\\_feature\n----------------\n\nWindows Roles and Features can be thought of as built-in ope | |
rating system packages that ship with the OS. A server role is a set of software programs that, when they are | |
installed and properly configured, lets a computer perform a specific function for multiple users or other co | |
mputers within a network. A Role can have multiple Role Services that provide functionality to the Role. Rol | |
e services are software programs that provide the functionality of a role. Features are software programs that | |
, although they are not directly parts of roles, can support or augment the functionality of one or more roles | |
, or improve the functionality of the server, regardless of which roles are installed. Collectively we refer | |
to all of these attributes as 'features'.\n\nThis resource allows you to manage these 'features' in an unatten | |
ded, idempotent way.\n\nThere are two providers for the `windows_features` which map into Microsoft's two majo | |
r tools for managing roles/features: [Deployment Image Servicing and Management (DISM)](http://msdn.microsoft. | |
com/en-us/library/dd371719(v=vs.85).aspx) and [Servermanagercmd](http://technet.microsoft.com/en-us/library/ee | |
344834(WS.10).aspx) (The CLI for Server Manager). As Servermanagercmd is deprecated, Chef will set the defaul | |
t provider to `Chef::Provider::WindowsFeature::DISM` if DISM is present on the system being configured. The d | |
efault provider will fall back to `Chef::Provider::WindowsFeature::ServerManagerCmd`.\n\nFor more information | |
on Roles, Role Services and Features see the [Microsoft TechNet article on the topic](http://technet.microsoft | |
.com/en-us/library/cc754923.aspx). For a complete list of all features that are available on a node type eith | |
er of the following commands at a command prompt:\n\n dism /online /Get-Features\n servermanagercmd -que | |
ry\n\n### Actions\n\n- :install: install a Windows role/feature\n- :remove: remove a Windows role/feature\n\n# | |
## Attribute Parameters\n\n- feature_name: name of the feature/role to install. The same feature may have dif | |
ferent names depending on the provider used (ie DHCPServer vs DHCP; DNS-Server-Full-Role vs DNS).\n\n### Provi | |
ders\n\n- **Chef::Provider::WindowsFeature::DISM**: Uses Deployment Image Servicing and Management (DISM) to m | |
anage roles/features.\n- **Chef::Provider::WindowsFeature::ServerManagerCmd**: Uses Server Manager to manage r | |
oles/features.\n\n### Examples\n\n # enable the node as a DHCP Server\n windows_feature \"DHCPServer\" d | |
o\n action :install\n end\n\n # enable TFTP\n windows_feature \"TFTP\" do\n action :install | |
\n end\n\n # disable Telnet client/server\n %w{ TelnetServer TelnetClient }.each do |feature|\n | |
windows_feature feature do\n action :remove\n end\n end\n\n #\n\nwindows\\_package\n-------- | |
--------\n\nManage Windows application packages in an unattended, idempotent way.\n\nThe following application | |
installers are currently supported:\n\n* MSI packages\n* InstallShield\n* Wise InstallMaster\n* Inno Setup\n* | |
Nullsoft Scriptable Install System\n\nIf the proper installer type is not passed into the resource's installe | |
r_type attribute, the provider will do it's best to identify the type by introspecting the installation packag | |
e. If the installation type cannot be properly identified the `:custom` value can be passed into the installe | |
r_type attribute along with the proper flags for silent/quiet installation (using the `options` attribute..see | |
example below).\n\n__PLEASE NOTE__ - For proper idempotence the resource's `package_name` should be the same | |
as the 'DisplayName' registry value in the uninstallation data that is created during package installation. T | |
he easiest way to definitively find the proper 'DisplayName' value is to install the package on a machine and | |
search for the uninstall information under the following registry keys:\n\n* `HKEY_LOCAL_MACHINE\\Software\\Mi | |
crosoft\\Windows\\CurrentVersion\\Uninstall`\n* `HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersi | |
on\\Uninstall`\n* `HKEY_LOCAL_MACHINE\\Software\\Wow6464Node\\Microsoft\\Windows\\CurrentVersion\\Uninstall`\n | |
\nFor maximum flexibility the `source` attribute supports both remote and local installation packages.\n\n### | |
Actions\n\n- :install: install a package\n- :remove: remove a package. The remove action is completely hit or | |
miss as many application uninstallers do not support a full silent/quiet mode.\n\n### Attribute Parameters\n\n | |
- package_name: name attribute. The 'DisplayName' of the application installation package.\n- source: The sour | |
ce of the windows installer. This can either be a URI or a local path.\n- installer_type: They type of window | |
s installation package. valid values are: :msi, :inno, :nsis, :wise, :installshield, :custom. If this value i | |
s not provided, the provider will do it's best to identify the installer type through introspection of the fil | |
e.\n- checksum: useful if source is remote, the SHA-256 checksum of the file--if the local file matches the ch | |
ecksum, Chef will not download it\n- options: Additional options to pass the underlying installation command\n | |
\n### Examples\n\n # install PuTTY (InnoSetup installer)\n windows_package \"PuTTY version 0.60\" do\n | |
source \"http://the.earth.li/~sgtatham/putty/latest/x86/putty-0.60-installer.exe\"\n installer_type : | |
inno\n action :install\n end\n\n # install 7-Zip (MSI installer)\n windows_package \"7-Zip 9.20 | |
(x64 edition)\" do\n source \"http://downloads.sourceforge.net/sevenzip/7z920-x64.msi\"\n action :in | |
stall\n end\n\n # install Notepad++ (Y U No Emacs?) using a local installer\n windows_package \"Notep | |
ad++\" do\n source \"c:/installation_files/npp.5.9.2.Installer.exe\"\n action :install\n end\n\n | |
# install VLC for that Xvid (NSIS installer)\n windows_package \"VLC media player 1.1.10\" do\n sou | |
rce \"http://superb-sea2.dl.sourceforge.net/project/vlc/1.1.10/win32/vlc-1.1.10-win32.exe\"\n action :ins | |
tall\n end\n\n # install Firefox as custom installer and manually set the silent install flags\n wind | |
ows_package \"Mozilla Firefox 5.0 (x86 en-US)\" do\n source \"http://archive.mozilla.org/pub/mozilla.org/ | |
mozilla.org/firefox/releases/5.0/win32/en-US/Firefox%20Setup%205.0.exe\"\n options \"-ms\"\n install | |
er_type :custom\n action :install\n end\n\n # Google Chrome FTW (MSI installer)\n windows_packag | |
e \"Google Chrome\" do\n source \"https://dl-ssl.google.com/tag/s/appguid%3D%7B8A69D345-D564-463C-AFF1-A6 | |
9D9E530F96%7D%26iid%3D%7B806F36C0-CB54-4A84-A3F3-0CF8A86575E0%7D%26lang%3Den%26browser%3D3%26usagestats%3D0%26 | |
appname%3DGoogle%2520Chrome%26needsadmin%3Dfalse/edgedl/chrome/install/GoogleChromeStandaloneEnterprise.msi\"\ | |
n action :install\n end\n\n # remove Google Chrome (but why??)\n windows_package \"Google Chrome | |
\" do\n action :remove\n end\n\n # remove 7-Zip\n windows_package \"7-Zip 9.20 (x64 edition)\" d | |
o\n action :remove\n end\n\n\nwindows\\_reboot\n---------------\n\nSets required data in the node's ru | |
n_state to notify `WindowsRebootHandler` a reboot is requested. If Chef run completes successfully a reboot w | |
ill occur if the `WindowsRebootHandler` is properly registered as a report handler. As an action of `:request | |
` will cause a node to reboot every Chef run, this resource is usually notified by other resources...ie restar | |
t node after a package is installed (see example below).\n\n### Actions\n- :request: requests a reboot at comp | |
letion of successful Cher run. requires `WindowsRebootHandler` to be registered as a report handler.\n- :canc | |
el: remove reboot request from node.run_state. this will cancel *ALL* previously requested reboots as this is | |
a binary state.\n\n### Attribute Parameters\n- :timeout: Name attribute. timeout delay in seconds to wait bef | |
ore proceeding with the requested reboot. default is 60 seconds\n- :reason: comment on the reason for the rebo | |
ot. default is 'Opscode Chef initiated reboot'\n\n### Examples\n\n # if the package installs, schedule a re | |
boot at end of chef run\n windows_reboot 60 do\n reason 'cause chef said so'\n action :nothing\n | |
end\n windows_package 'some_package' do\n action :install\n notifies :request, 'windows_reboot | |
[60]'\n end\n\n # cancel the previously requested reboot\n windows_reboot 60 do\n action :cancel | |
\n end\n\nwindows\\_registry\n-----------------\n\nCreates and modifies Windows registry keys.\n\n### Actio | |
ns\n\n- :create: create a new registry key with the provided values.\n- :modify: modify an existing registry k | |
ey with the provided values.\n- :force_modify: modify an existing registry key with the provided values. ensu | |
res the value is actually set by checking multiple times. useful for fighting race conditions where two proces | |
ses are trying to set the same registry key. This will be updated in the near future to use 'RegNotifyChangeK | |
eyValue' which is exposed by the WinAPI and allows a process to register for notification on a registry key ch | |
ange.\n- :remove: removes a value from an existing registry key\n\n### Attribute Parameters\n\n- key_name: nam | |
e attribute. The registry key to create/modify.\n- values: hash of the values to set under the registry key. T | |
he individual hash items will become respective 'Value name' => 'Value data' items in the registry key.\n- typ | |
e: Type of key to create, currently only used for :binary to create `REG_BINARY` registry keys. Must be a symb | |
ol. See __Roadmap__ for future plans.\n\n### Examples\n\n # make the local windows proxy match the one set | |
for Chef\n proxy = URI.parse(Chef::Config[:http_proxy])\n windows_registry 'HKCU\\Software\\Microsoft\\W | |
indows\\CurrentVersion\\Internet Settings' do\n values 'ProxyEnable' => 1, 'ProxyServer' => \"\#{proxy.ho | |
st}:\#{proxy.port}\", 'ProxyOverride' => '<local>'\n end\n\n # enable Remote Desktop and poke the firewa | |
ll hole\n windows_registry 'HKLM\\SYSTEM\\CurrentControlSet\\Control\\Terminal Server' do\n values 'Fd | |
enyTSConnections' => 0\n end\n\n # Delete an item from the registry\n windows_registry 'HKCU\\Softwar | |
e\\Test' do\n #Key is the name of the value that you want to delete the value is always empty\n valu | |
es 'ValueToDelete' => ''\n action :remove\n end\n\n### Library Methods\n\n Registry.value_exists?(' | |
HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run','BGINFO')\n Registry.key_exists?('HKLM\\SOFTWARE\\ | |
Microsoft')\n BgInfo = Registry.get_value('HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run','BGINFO | |
')\n\n\nwindows\\_path\n-------------\n\n### Actions\n- :add: Add an item to the system path\n\n### Attribute | |
Parameters\n- :path: Name attribute. The name of the value to add to the system path\n\n### Examples\n\n #A | |
dd Sysinternals to the system path\n windows_path 'C:\\Sysinternals' do\n action :add\n end\n\n\nwi | |
ndows\\_zipfile\n----------------\n\nMost version of Windows do not ship with native cli utility for managing | |
compressed files. This resource provides a pure-ruby implementation for managing zip files. Be sure to use th | |
e `not_if` or `only_if` meta parameters to guard the resource for idempotence or action will be taken on the z | |
ip file every Chef run.\n\n### Actions\n\n- :unzip: unzip a compressed file\n\n### Attribute Parameters\n\n- p | |
ath: name attribute. The path where files will be unzipped to.\n- source: The source of the zip file. This can | |
either be a URI or a local path.\n- overwrite: force an overwrite of the files if the already exists.\n\n### | |
Examples\n\n # unzip a remote zip file locally\n windows_zipfile \"c:/bin\" do\n source \"http://do | |
wnload.sysinternals.com/Files/SysinternalsSuite.zip\"\n action :unzip\n not_if {::File.exists?(\"c:/ | |
bin/PsExec.exe\")}\n end\n\n # unzip a local zipfile\n windows_zipfile \"c:/the_codez\" do\n sou | |
rce \"c:/foo/baz/the_codez.zip\"\n action :unzip\n end\n\n\nException/Report Handlers\n=============== | |
==========\n\nWindowsRebootHandler\n--------------------\n\nRequired reboots are a necessary evil of configuri | |
ng and managing Windows nodes. This report handler (ie fires at the end of successful Chef runs) acts on requ | |
ested (Chef initiated) or pending (as determined by the OS per configuration action we performed) reboots. Th | |
e `allow_pending_reboots` initialization argument should be set to false if you do not want the handler to aut | |
omatically reboot a node if it has been determined a reboot is pending. Reboots can still be requested explic | |
itly via the `windows_reboot` LWRP.\n\n## Initialization Arguments\n\n- `allow_pending_reboots`: indicator on | |
whether the handler should act on a the Window's 'pending reboot' state. default is true\n- `timeout`: timeout | |
delay in seconds to wait before proceeding with the reboot. default is 60 seconds\n- `reason`: comment on th | |
e reason for the reboot. default is 'Opscode Chef initiated reboot'\n\nUsage\n=====\n\nJust place an explicit | |
dependency on this cookbook (using depends in the cookbook's metadata.rb) from any cookbook where you would li | |
ke to use the Windows-specific resources/providers that ship with this cookbook.\n\ndefault\n-------\n\nConven | |
ience recipe that installs supporting gems for many of the resources/providers that ship with this cookbook.\n | |
\nreboot\\_handler\n--------------\n\nLeverages the `chef_handler` LWRP to register the `WindowsRebootHandler` | |
report handler that ships as part of this cookbook. By default this handler is set to automatically act on pe | |
nding reboots. If you would like to change this behavior override `node['windows']['allow_pending_reboots']` | |
and set the value to false. For example:\n\n % cat roles/base.rb\n name \"base\"\n description \"bas | |
e role\"\n override_attributes(\n \"windows\" => {\n \"allow_pending_reboots\" => false\n | |
}\n )\n\nThis will still allow a reboot to be explicitly requested via the `windows_reboot` LWRP.\n\nChange | |
s/Roadmap\n===============\n\n## Future\n\n* package preseeding/response_file support\n* package installation | |
location via a `target_dir` attribute.\n* [COOK-666] `windows_package` should support CoApp packages\n* window | |
s_registry :force_modify action should use RegNotifyChangeKeyValue from WinAPI\n* WindowsRebootHandler/`window | |
s_reboot` LWRP should support kicking off subsequent chef run on reboot.\n* Support all types of registry keys | |
with `type` parameter in `windows_registry`.\n\n### v1.2.10\n\n* [COOK-939] - add `type` parameter to `window | |
s_registry` to allow binary registry keys.\n* [COOK-940] - refactor logic so multiple values get created.\n\n# | |
## v1.2.8\n\n* FIX: Older Windows (Windows Server 2003) sometimes return 127 on successful forked commands\n* | |
FIX: `windows_package`, ensure we pass the WOW* registry redirection flags into reg.open\n\n### v1.2.6\n\n* pa | |
tch to fix [CHEF-2684], Open4 is named Open3 in Ruby 1.9\n* Ruby 1.9's Open3 returns 0 and 42 for successful c | |
ommands\n* retry keyword can only be used in a rescue block in Ruby 1.9\n\n### v1.2.4\n\n* windows_package - c | |
atch Win32::Registry::Error that pops up when searching certain keys\n\n### v1.2.2\n\n* combined numerous help | |
er libarires for easier sharing across libaries/LWRPs\n* renamed Chef::Provider::WindowsFeature::Base file to | |
the more descriptive `feature_base.rb`\n* refactored windows_path LWRP\n * :add action should MODIFY the the | |
underlying ENV variable (vs CREATE)\n * deleted greedy :remove action until it could be made more idempotent\ | |
n* added a windows_batch resource/provider for running batch scripts remotely\n\n### v1.2.0\n\n* [COOK-745] gr | |
acefully handle required server restarts on Windows platform\n * WindowsRebootHandler for requested and pendi | |
ng reboots\n * windows_reboot LWRP for requesting (receiving notifies) reboots\n * reboot_handler recipe for | |
enabling WindowsRebootHandler as a report handler\n* [COOK-714] Correct initialize misspelling\n* RegistryHel | |
per - new `get_values` method which returns all values for a particular key.\n\n### v1.0.8\n\n* [COOK-719] res | |
ource/provider for managing windows features\n* [COOK-717] remove `windows_env_vars` resource as env resource | |
exists in core chef\n* new `Windows::Version` helper class\n* refactored `Windows::Helper` mixin\n\n### v1.0.6 | |
\n\n* added `force_modify` action to `windows_registry` resource\n* add `win_friendly_path` helper\n* re-purpo | |
se default recipe to install useful supporting windows related gems\n\n### v1.0.4\n\n* [COOK-700] new resource | |
s and improvements to the `windows_registry` provider (thanks Paul Morton!)\n * Open the registry in the bite | |
dnes of the OS\n * Provide convenience methods to check if keys and values exit\n * Provide convenience meth | |
od for reading registry values\n * NEW - `windows_auto_run` resource/provider\n * NEW - `windows_env_vars` r | |
esource/provider\n * NEW - `windows_path` resource/provider\n* re-write of the windows_package logic for dete | |
rmining current installed packages\n* new checksum attribute for windows_package resource...useful for remote | |
packages\n\n### v1.0.2:\n\n* [COOK-647] account for Wow6432Node registry redirecter\n* [COOK-656] begin/rescue | |
on win32/registry\n\n### 1.0.0:\n\n* [COOK-612] initial release\n\nLicense and Author\n==================\n\n | |
Author:: Seth Chisamore (<schisamo@opscode.com>)\nAuthor:: Doug MacEachern (<dougm@vmware.com>)\nAuthor:: Paul | |
Morton (<pmorton@biaprotect.com>)\n\nCopyright:: 2011, Opscode, Inc.\nCopyright:: 2010, VMware, Inc.\nCopyrig | |
ht:: 2011, Business Intelligence Associates, Inc\n\n\nLicensed under the Apache License, Version 2.0 (the \"Li | |
cense\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the Lice | |
nse at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\nUnless required by applicable law or agreed to in | |
writing, software\ndistributed under the License is distributed on an \"AS IS\" BASIS,\nWITHOUT WARRANTIES OR | |
CONDITIONS OF ANY KIND, either express or implied.\nSee the License for the specific language governing permis | |
sions and\nlimitations under the License.\n", @maintainer="Opscode, Inc.", @maintainer_email="cookbooks@opscod | |
e.com", @license="Apache 2.0", @description="Provides a set of useful Windows-specific primitives.", @platform | |
s={"windows"=>">= 0.0.0"}, @dependencies={"chef_handler"=>">= 0.0.0"}, @recommendations={}, @suggestions={}, @ | |
conflicting={}, @providing={"windows"=>">= 0.0.0", "windows::reboot_handler"=>">= 0.0.0"}, @replacing={}, @att | |
ributes={}, @groupings={}, @recipes={"windows"=>"", "windows::reboot_handler"=>""}, @version="1.2.10">, @check | |
sums={"f96479910ab96b5f06315c0ca0b302a4"=>nil, "5317f17e18e8edf0dbed3b67f2a0487d"=>nil, "c58c55315e2898eb773c1 | |
bde8d585709"=>nil, "8916c5b22a18c87947dff58b71b974af"=>nil, "b8472303b776c2322600a0751c815395"=>nil, "848bd700 | |
c257e846d1011bda420d54e8"=>nil, "53fe31b998dfd009d7b8f58fa2380c0c"=>nil, "60e1a5b1b17dfc60285fb28fcd3870be"=>n | |
il, "2c46e31754b7e949a5857e2957bbc255"=>nil, "f52bafb5e9ce97d2a7258445b6b56406"=>nil, "271dba97116e58581ea4c65 | |
0386dd8f3"=>nil, "e58459cdaff6ef1bafb9fae64dffcc86"=>nil, "7859415b67a1db7633695b1acc9704fd"=>nil, "6aca1c8d5a | |
8ad48c260e264f598e9bb4"=>nil, "4b487ea5f4b20a2b17c761badcc55cfa"=>nil, "706f2a6b16ed14193e45c3016a71a0c5"=>nil | |
, "aa71d112a4856c8aaf422c7e8503e971"=>nil, "b8f4746c0dc02ee922751006fa0b9c3f"=>nil, "a55d8ab514d9d9efae136a872 | |
711f80f"=>nil, "568fe3411d4a69f1c3c9b32780b24cf7"=>nil, "76f502ee18c89d7beb68e7f13ab0e9c0"=>nil, "cead86571eaa | |
50734abbcdfc608025fd"=>nil, "724ecf2579c182dff0f21a92b262256e"=>nil, "9b20966748f370b153659189191c3859"=>nil, | |
"6b1e4d953a821a36e60a3a434783a42b"=>nil, "eda001f275230230125ff1c8dbcd01af"=>nil, "79a76ab34126d1e28c62c4f070b | |
10dc9"=>nil, "d00cacbe68f1a7257ca40e0ae89293d7"=>nil, "fe5055d81afa103bc3e47692daa2aa9f"=>nil, "64a0f1e6dafcaa | |
4a5a5077a0dd07a430"=>nil}, @manifest_records_by_path={"resources/zipfile.rb"=>{"name"=>"zipfile.rb", "url"=>"h | |
ttps://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksu | |
m-f96479910ab96b5f06315c0ca0b302a4?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=Qq7hFcs2Yz | |
8CQRt8VCgDL6WYDjA%3D", "checksum"=>"f96479910ab96b5f06315c0ca0b302a4", "path"=>"resources/zipfile.rb", "specif | |
icity"=>"default"}, "resources/package.rb"=>{"name"=>"package.rb", "url"=>"https://s3.amazonaws.com/opscode-pl | |
atform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-5317f17e18e8edf0dbed3b67f2a0487d | |
?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=Kk9pUI3vtbQcttnkjn%2BcDb0j6zM%3D", "checksum | |
"=>"5317f17e18e8edf0dbed3b67f2a0487d", "path"=>"resources/package.rb", "specificity"=>"default"}, "resources/r | |
egistry.rb"=>{"name"=>"registry.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organiz | |
ation-5beb2e18f5854d1a90067d55bcbe98d8/checksum-c58c55315e2898eb773c1bde8d585709?AWSAccessKeyId=AKIAJOZTD2N26S | |
7W6APA&Expires=1329588248&Signature=3tQ0YT0Th%2Bntah8hm279FJGc800%3D", "checksum"=>"c58c55315e2898eb773c1bde8d | |
585709", "path"=>"resources/registry.rb", "specificity"=>"default"}, "resources/auto_run.rb"=>{"name"=>"auto_r | |
un.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d5 | |
5bcbe98d8/checksum-8916c5b22a18c87947dff58b71b974af?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Sig | |
nature=suXa1WlTvHI0o1TmCDhnkosQZI8%3D", "checksum"=>"8916c5b22a18c87947dff58b71b974af", "path"=>"resources/aut | |
o_run.rb", "specificity"=>"default"}, "resources/reboot.rb"=>{"name"=>"reboot.rb", "url"=>"https://s3.amazonaw | |
s.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-b8472303b776c232 | |
2600a0751c815395?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=%2Fci%2F%2B7kH0CLOaDIwtLpcSV | |
zQpWs%3D", "checksum"=>"b8472303b776c2322600a0751c815395", "path"=>"resources/reboot.rb", "specificity"=>"defa | |
ult"}, "resources/path.rb"=>{"name"=>"path.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-d | |
ata/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-848bd700c257e846d1011bda420d54e8?AWSAccessKeyId=AKI | |
AJOZTD2N26S7W6APA&Expires=1329588248&Signature=ds2sh%2B8O02e%2F73vdTzW8QwPTrzA%3D", "checksum"=>"848bd700c257e | |
846d1011bda420d54e8", "path"=>"resources/path.rb", "specificity"=>"default"}, "resources/batch.rb"=>{"name"=>" | |
batch.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a9006 | |
7d55bcbe98d8/checksum-53fe31b998dfd009d7b8f58fa2380c0c?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248& | |
Signature=7uziTu%2BWkHNxkHjWiqw54AXCSMs%3D", "checksum"=>"53fe31b998dfd009d7b8f58fa2380c0c", "path"=>"resource | |
s/batch.rb", "specificity"=>"default"}, "resources/feature.rb"=>{"name"=>"feature.rb", "url"=>"https://s3.amaz | |
onaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-60e1a5b1b17d | |
fc60285fb28fcd3870be?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=UAIlMzAJ%2Bgin%2Bgh9zd9h | |
AvPwgX0%3D", "checksum"=>"60e1a5b1b17dfc60285fb28fcd3870be", "path"=>"resources/feature.rb", "specificity"=>"d | |
efault"}, "providers/registry.rb"=>{"name"=>"registry.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-p | |
roduction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-2c46e31754b7e949a5857e2957bbc255?AWSAcce | |
ssKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=DqYKUVvu%2FlJBgqSDgXV%2B5I0LL2Q%3D", "checksum"=>"2c | |
46e31754b7e949a5857e2957bbc255", "path"=>"providers/registry.rb", "specificity"=>"default"}, "providers/auto_r | |
un.rb"=>{"name"=>"auto_run.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization | |
-5beb2e18f5854d1a90067d55bcbe98d8/checksum-f52bafb5e9ce97d2a7258445b6b56406?AWSAccessKeyId=AKIAJOZTD2N26S7W6AP | |
A&Expires=1329588248&Signature=a1l8JU0thZ%2BzJSOPi5KjODH5HUU%3D", "checksum"=>"f52bafb5e9ce97d2a7258445b6b5640 | |
6", "path"=>"providers/auto_run.rb", "specificity"=>"default"}, "providers/path.rb"=>{"name"=>"path.rb", "url" | |
=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/che | |
cksum-271dba97116e58581ea4c650386dd8f3?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=PnG8iJ | |
NzgPFoOWGHrfZrUreMHLo%3D", "checksum"=>"271dba97116e58581ea4c650386dd8f3", "path"=>"providers/path.rb", "speci | |
ficity"=>"default"}, "providers/feature_servermanagercmd.rb"=>{"name"=>"feature_servermanagercmd.rb", "url"=>" | |
https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checks | |
um-e58459cdaff6ef1bafb9fae64dffcc86?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=etgh%2B0p | |
tFnOwNfiW9sFopDqN7a4%3D", "checksum"=>"e58459cdaff6ef1bafb9fae64dffcc86", "path"=>"providers/feature_serverman | |
agercmd.rb", "specificity"=>"default"}, "providers/zipfile.rb"=>{"name"=>"zipfile.rb", "url"=>"https://s3.amaz | |
onaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-7859415b67a1 | |
db7633695b1acc9704fd?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=jkzyZ0b33AWcOr1t5r8ERcVm | |
Bg8%3D", "checksum"=>"7859415b67a1db7633695b1acc9704fd", "path"=>"providers/zipfile.rb", "specificity"=>"defau | |
lt"}, "providers/package.rb"=>{"name"=>"package.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-product | |
ion-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-6aca1c8d5a8ad48c260e264f598e9bb4?AWSAccessKeyI | |
d=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=EDnAPMUn1Ox88EY7Q4VB0Ll55W8%3D", "checksum"=>"6aca1c8d5a8a | |
d48c260e264f598e9bb4", "path"=>"providers/package.rb", "specificity"=>"default"}, "providers/batch.rb"=>{"name | |
"=>"batch.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a | |
90067d55bcbe98d8/checksum-4b487ea5f4b20a2b17c761badcc55cfa?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588 | |
248&Signature=1rKmNBsU%2FB50BxYzobpAIQYXBAQ%3D", "checksum"=>"4b487ea5f4b20a2b17c761badcc55cfa", "path"=>"prov | |
iders/batch.rb", "specificity"=>"default"}, "providers/feature_dism.rb"=>{"name"=>"feature_dism.rb", "url"=>"h | |
ttps://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksu | |
m-706f2a6b16ed14193e45c3016a71a0c5?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=NYNHRzg20o | |
tEnu9PqfCRYrz96DE%3D", "checksum"=>"706f2a6b16ed14193e45c3016a71a0c5", "path"=>"providers/feature_dism.rb", "s | |
pecificity"=>"default"}, "providers/reboot.rb"=>{"name"=>"reboot.rb", "url"=>"https://s3.amazonaws.com/opscode | |
-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-aa71d112a4856c8aaf422c7e8503e | |
971?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=RyoSysJRgZ3kD3VRmpFo0XhifJ4%3D", "checksu | |
m"=>"aa71d112a4856c8aaf422c7e8503e971", "path"=>"providers/reboot.rb", "specificity"=>"default"}, "recipes/def | |
ault.rb"=>{"name"=>"default.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organizatio | |
n-5beb2e18f5854d1a90067d55bcbe98d8/checksum-b8f4746c0dc02ee922751006fa0b9c3f?AWSAccessKeyId=AKIAJOZTD2N26S7W6A | |
PA&Expires=1329588248&Signature=KedGzMRkiQl%2B06ul%2BNZG6X%2BgdvA%3D", "checksum"=>"b8f4746c0dc02ee922751006fa | |
0b9c3f", "path"=>"recipes/default.rb", "specificity"=>"default"}, "recipes/reboot_handler.rb"=>{"name"=>"reboo | |
t_handler.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a | |
90067d55bcbe98d8/checksum-a55d8ab514d9d9efae136a872711f80f?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588 | |
248&Signature=mIziC4oaEAS3MdlZ4EHUQMdjOH4%3D", "checksum"=>"a55d8ab514d9d9efae136a872711f80f", "path"=>"recipe | |
s/reboot_handler.rb", "specificity"=>"default"}, "libraries/feature_base.rb"=>{"name"=>"feature_base.rb", "url | |
"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/ch | |
ecksum-568fe3411d4a69f1c3c9b32780b24cf7?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=qFm%2 | |
BeREpTVIBnSFK%2BDKjWfmLpPQ%3D", "checksum"=>"568fe3411d4a69f1c3c9b32780b24cf7", "path"=>"libraries/feature_bas | |
e.rb", "specificity"=>"default"}, "libraries/registry_helper.rb"=>{"name"=>"registry_helper.rb", "url"=>"https | |
://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-76 | |
f502ee18c89d7beb68e7f13ab0e9c0?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=7eiaV4gS4XGC8e | |
46twRX7fNUgIc%3D", "checksum"=>"76f502ee18c89d7beb68e7f13ab0e9c0", "path"=>"libraries/registry_helper.rb", "sp | |
ecificity"=>"default"}, "libraries/helper.rb"=>{"name"=>"helper.rb", "url"=>"https://s3.amazonaws.com/opscode- | |
platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-cead86571eaa50734abbcdfc608025 | |
fd?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=nqwmQDawggxfeZRUVxC7Or14nNw%3D", "checksum | |
"=>"cead86571eaa50734abbcdfc608025fd", "path"=>"libraries/helper.rb", "specificity"=>"default"}, "libraries/wi | |
ndows_privileged.rb"=>{"name"=>"windows_privileged.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-prod | |
uction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-724ecf2579c182dff0f21a92b262256e?AWSAccessK | |
eyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=nDsYVKjkkl2E%2FrXJSv4vjWjneGY%3D", "checksum"=>"724ecf2 | |
579c182dff0f21a92b262256e", "path"=>"libraries/windows_privileged.rb", "specificity"=>"default"}, "libraries/v | |
ersion.rb"=>{"name"=>"version.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organizat | |
ion-5beb2e18f5854d1a90067d55bcbe98d8/checksum-9b20966748f370b153659189191c3859?AWSAccessKeyId=AKIAJOZTD2N26S7W | |
6APA&Expires=1329588248&Signature=mpkkFFnwcaYqQwHOZA2AwP30OZc%3D", "checksum"=>"9b20966748f370b153659189191c38 | |
59", "path"=>"libraries/version.rb", "specificity"=>"default"}, "libraries/ruby_19_patches.rb"=>{"name"=>"ruby | |
_19_patches.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d | |
1a90067d55bcbe98d8/checksum-6b1e4d953a821a36e60a3a434783a42b?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=13295 | |
88248&Signature=G9RyT4s5spgs4NKsCz36NmjLsSM%3D", "checksum"=>"6b1e4d953a821a36e60a3a434783a42b", "path"=>"libr | |
aries/ruby_19_patches.rb", "specificity"=>"default"}, "attributes/default.rb"=>{"name"=>"default.rb", "url"=>" | |
https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checks | |
um-eda001f275230230125ff1c8dbcd01af?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=Dk%2BTtSA | |
2bjxDl0sVU4zJUrZnfpE%3D", "checksum"=>"eda001f275230230125ff1c8dbcd01af", "path"=>"attributes/default.rb", "sp | |
ecificity"=>"default"}, "files/default/handlers/windows_reboot_handler.rb"=>{"name"=>"handlers/windows_reboot_ | |
handler.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90 | |
067d55bcbe98d8/checksum-79a76ab34126d1e28c62c4f070b10dc9?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=132958824 | |
8&Signature=Pzy4Mt%2FQiuUuWp1prLr0o8jpgGQ%3D", "checksum"=>"79a76ab34126d1e28c62c4f070b10dc9", "path"=>"files/ | |
default/handlers/windows_reboot_handler.rb", "specificity"=>"default"}, "README.md"=>{"name"=>"README.md", "ur | |
l"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/c | |
hecksum-d00cacbe68f1a7257ca40e0ae89293d7?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=jNiE | |
bHYq4b%2BVzm6FDiD8n1H7OnU%3D", "checksum"=>"d00cacbe68f1a7257ca40e0ae89293d7", "path"=>"README.md", "specifici | |
ty"=>"default"}, "metadata.rb"=>{"name"=>"metadata.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-prod | |
uction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-fe5055d81afa103bc3e47692daa2aa9f?AWSAccessK | |
eyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=6ZJpwHTTJA0R1E6mAls9%2Bb2%2Fw7s%3D", "checksum"=>"fe505 | |
5d81afa103bc3e47692daa2aa9f", "path"=>"metadata.rb", "specificity"=>"default"}, "metadata.json"=>{"name"=>"met | |
adata.json", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90 | |
067d55bcbe98d8/checksum-64a0f1e6dafcaa4a5a5077a0dd07a430?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=132958824 | |
8&Signature=%2F910xraF%2FCEOqCZ%2FnNdIsLvNTUU%3D", "checksum"=>"64a0f1e6dafcaa4a5a5077a0dd07a430", "path"=>"me | |
tadata.json", "specificity"=>"default"}}, @attribute_filenames_by_short_filename={"default"=>"default.rb"}>, " | |
openssl"=>#<Chef::CookbookVersion:0x2cea0e8 @name="openssl", @frozen=false, @attribute_filenames=[], @definiti | |
on_filenames=[], @template_filenames=[], @file_filenames=[], @recipe_filenames=["default.rb"], @recipe_filenam | |
es_by_name={"default"=>"default.rb"}, @library_filenames=["secure_password.rb"], @resource_filenames=[], @prov | |
ider_filenames=[], @metadata_filenames=[], @root_dir=nil, @root_filenames=["README.md", "metadata.rb", "metada | |
ta.json"], @couchdb_id=nil, @couchdb=#<Chef::CouchDB:0x2ce9ba8 @db="chef", @rest=#<Chef::REST:0x2ce9b48 @url=" | |
http://localhost:5984", @cookies={}, @default_headers={}, @auth_credentials=#<Chef::REST::AuthCredentials:0x2c | |
e9908 @key_file=nil, @client_name=nil>, @sign_request=true, @sign_on_redirect=true, @redirects_followed=0, @re | |
direct_limit=10>>, @couchdb_rev=nil, @status=:ready, @manifest={"name"=>"openssl-1.0.0", "definitions"=>[], "j | |
son_class"=>"Chef::CookbookVersion", "files"=>[], "attributes"=>[], "metadata"=>{"name"=>"openssl", "descripti | |
on"=>"Provides a library with a method for generating secure random passwords.", "long_description"=>"Descript | |
ion\n====\n\nProvide a library method to generate secure random passwords in recipes.\n\nRequirements\n====\n\ | |
nWorks on any platform with OpenSSL Ruby bindings installed, which are a requirement for Chef anyway.\n\nUsage | |
\n====\n\nMost often this will be used to generate a secure password for an attribute.\n\n include Opscode: | |
:OpenSSL::Password\n\n set_unless[:my_password] = secure_password\n\nLicense and Author\n====\n\nAuthor:: J | |
oshua Timberman (<joshua@opscode.com>)\n\nCopyright:: 2009-2011, Opscode, Inc\n\nLicensed under the Apache Lic | |
ense, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou ma | |
y obtain a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\nUnless required by appl | |
icable law or agreed to in writing, software\ndistributed under the License is distributed on an \"AS IS\" BAS | |
IS,\nWITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\nSee the License for the specifi | |
c language governing permissions and\nlimitations under the License.\n", "maintainer"=>"Opscode, Inc.", "maint | |
ainer_email"=>"cookbooks@opscode.com", "license"=>"Apache 2.0", "platforms"=>{}, "dependencies"=>{}, "recommen | |
dations"=>{}, "suggestions"=>{}, "conflicting"=>{}, "providing"=>{"openssl"=>">= 0.0.0"}, "replacing"=>{}, "at | |
tributes"=>{}, "groupings"=>{}, "recipes"=>{"openssl"=>""}, "version"=>"1.0.0"}, "providers"=>[], "cookbook_na | |
me"=>"openssl", "templates"=>[], "libraries"=>[{"name"=>"secure_password.rb", "url"=>"https://s3.amazonaws.com | |
/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-b3bf8b34c97e21c5ee6aa | |
0ddb11b133e?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=map9KKI5wHL9jvqUiLeF0%2FIewUs%3D" | |
, "checksum"=>"b3bf8b34c97e21c5ee6aa0ddb11b133e", "path"=>"libraries/secure_password.rb", "specificity"=>"defa | |
ult"}], "resources"=>[], "version"=>"1.0.0", "recipes"=>[{"name"=>"default.rb", "url"=>"https://s3.amazonaws.c | |
om/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-cd9b688975824954297 | |
838f7d4214b7f?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=C33j%2BGfpAdRYwpWWJ%2FpB2S8VSwc | |
%3D", "checksum"=>"cd9b688975824954297838f7d4214b7f", "path"=>"recipes/default.rb", "specificity"=>"default"}] | |
, "root_files"=>[{"name"=>"README.md", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organ | |
ization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-f111ba97dc5160e26eee6473dc8e86d5?AWSAccessKeyId=AKIAJOZTD2N2 | |
6S7W6APA&Expires=1329588248&Signature=qzmQ6CGatqTiyMwp9ylb6EozJSE%3D", "checksum"=>"f111ba97dc5160e26eee6473dc | |
8e86d5", "path"=>"README.md", "specificity"=>"default"}, {"name"=>"metadata.rb", "url"=>"https://s3.amazonaws. | |
com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-aa56fc9900227fdc83 | |
b25654ee316593?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=AJDc7zGpUgfdi9n0YjZn4w6Borw%3D | |
", "checksum"=>"aa56fc9900227fdc83b25654ee316593", "path"=>"metadata.rb", "specificity"=>"default"}, {"name"=> | |
"metadata.json", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d | |
1a90067d55bcbe98d8/checksum-952c568d3a52988f8610f62fcfc0397e?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=13295 | |
88248&Signature=CeOqhhVDZdVunUq6XtMdVM07p7M%3D", "checksum"=>"952c568d3a52988f8610f62fcfc0397e", "path"=>"meta | |
data.json", "specificity"=>"default"}], "frozen?"=>false, "chef_type"=>"cookbook_version"}, @file_vendor=nil, | |
@metadata=#<Chef::Cookbook::Metadata:0x2cb6008 @cookbook=nil, @name="openssl", @long_description="Description\ | |
n====\n\nProvide a library method to generate secure random passwords in recipes.\n\nRequirements\n====\n\nWor | |
ks on any platform with OpenSSL Ruby bindings installed, which are a requirement for Chef anyway.\n\nUsage\n== | |
==\n\nMost often this will be used to generate a secure password for an attribute.\n\n include Opscode::Ope | |
nSSL::Password\n\n set_unless[:my_password] = secure_password\n\nLicense and Author\n====\n\nAuthor:: Joshu | |
a Timberman (<joshua@opscode.com>)\n\nCopyright:: 2009-2011, Opscode, Inc\n\nLicensed under the Apache License | |
, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may ob | |
tain a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\nUnless required by applicab | |
le law or agreed to in writing, software\ndistributed under the License is distributed on an \"AS IS\" BASIS,\ | |
nWITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\nSee the License for the specific la | |
nguage governing permissions and\nlimitations under the License.\n", @maintainer="Opscode, Inc.", @maintainer_ | |
email="cookbooks@opscode.com", @license="Apache 2.0", @description="Provides a library with a method for gener | |
ating secure random passwords.", @platforms={}, @dependencies={}, @recommendations={}, @suggestions={}, @confl | |
icting={}, @providing={"openssl"=>">= 0.0.0"}, @replacing={}, @attributes={}, @groupings={}, @recipes={"openss | |
l"=>""}, @version="1.0.0">, @checksums={"cd9b688975824954297838f7d4214b7f"=>nil, "b3bf8b34c97e21c5ee6aa0ddb11b | |
133e"=>nil, "f111ba97dc5160e26eee6473dc8e86d5"=>nil, "aa56fc9900227fdc83b25654ee316593"=>nil, "952c568d3a52988 | |
f8610f62fcfc0397e"=>nil}, @manifest_records_by_path={"recipes/default.rb"=>{"name"=>"default.rb", "url"=>"http | |
s://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-c | |
d9b688975824954297838f7d4214b7f?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=C33j%2BGfpAdR | |
YwpWWJ%2FpB2S8VSwc%3D", "checksum"=>"cd9b688975824954297838f7d4214b7f", "path"=>"recipes/default.rb", "specifi | |
city"=>"default"}, "libraries/secure_password.rb"=>{"name"=>"secure_password.rb", "url"=>"https://s3.amazonaws | |
.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-b3bf8b34c97e21c5e | |
e6aa0ddb11b133e?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=map9KKI5wHL9jvqUiLeF0%2FIewUs | |
%3D", "checksum"=>"b3bf8b34c97e21c5ee6aa0ddb11b133e", "path"=>"libraries/secure_password.rb", "specificity"=>" | |
default"}, "README.md"=>{"name"=>"README.md", "url"=>"https://s3.amazonaws.com/opscode-platform-production-dat | |
a/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-f111ba97dc5160e26eee6473dc8e86d5?AWSAccessKeyId=AKIAJ | |
OZTD2N26S7W6APA&Expires=1329588248&Signature=qzmQ6CGatqTiyMwp9ylb6EozJSE%3D", "checksum"=>"f111ba97dc5160e26ee | |
e6473dc8e86d5", "path"=>"README.md", "specificity"=>"default"}, "metadata.rb"=>{"name"=>"metadata.rb", "url"=> | |
"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/check | |
sum-aa56fc9900227fdc83b25654ee316593?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=AJDc7zGp | |
Ugfdi9n0YjZn4w6Borw%3D", "checksum"=>"aa56fc9900227fdc83b25654ee316593", "path"=>"metadata.rb", "specificity"= | |
>"default"}, "metadata.json"=>{"name"=>"metadata.json", "url"=>"https://s3.amazonaws.com/opscode-platform-prod | |
uction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-952c568d3a52988f8610f62fcfc0397e?AWSAccessK | |
eyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=CeOqhhVDZdVunUq6XtMdVM07p7M%3D", "checksum"=>"952c568d3 | |
a52988f8610f62fcfc0397e", "path"=>"metadata.json", "specificity"=>"default"}}, @attribute_filenames_by_short_f | |
ilename={}>, "chef_handler"=>#<Chef::CookbookVersion:0x2c64228 @name="chef_handler", @frozen=false, @attribute | |
_filenames=["default.rb"], @definition_filenames=[], @template_filenames=[], @file_filenames=["handlers/README | |
"], @recipe_filenames=["default.rb", "json_file.rb"], @recipe_filenames_by_name={"default"=>"default.rb", "jso | |
n_file"=>"json_file.rb"}, @library_filenames=[], @resource_filenames=["default.rb"], @provider_filenames=["def | |
ault.rb"], @metadata_filenames=[], @root_dir=nil, @root_filenames=["README.md", "metadata.rb", "metadata.json" | |
], @couchdb_id=nil, @couchdb=#<Chef::CouchDB:0x2c63df0 @db="chef", @rest=#<Chef::REST:0x2c63dd8 @url="http://l | |
ocalhost:5984", @cookies={}, @default_headers={}, @auth_credentials=#<Chef::REST::AuthCredentials:0x2c63c58 @k | |
ey_file=nil, @client_name=nil>, @sign_request=true, @sign_on_redirect=true, @redirects_followed=0, @redirect_l | |
imit=10>>, @couchdb_rev=nil, @status=:ready, @manifest={"definitions"=>[], "name"=>"chef_handler-1.0.4", "file | |
s"=>[{"name"=>"handlers/README", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organizatio | |
n-5beb2e18f5854d1a90067d55bcbe98d8/checksum-1976d7bafb98f6be15781023e134d943?AWSAccessKeyId=AKIAJOZTD2N26S7W6A | |
PA&Expires=1329588248&Signature=3uArc9jAFTi4LzQFSN93fpgZmTM%3D", "checksum"=>"1976d7bafb98f6be15781023e134d943 | |
", "path"=>"files/default/handlers/README", "specificity"=>"default"}], "attributes"=>[{"name"=>"default.rb", | |
"url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d | |
8/checksum-710010283d3560b512263d52f8271aa3?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=G | |
XU8I9HXG9SE02Gm7T5nYg%2FYzjE%3D", "checksum"=>"710010283d3560b512263d52f8271aa3", "path"=>"attributes/default. | |
rb", "specificity"=>"default"}], "json_class"=>"Chef::CookbookVersion", "providers"=>[{"name"=>"default.rb", " | |
url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8 | |
/checksum-1af403317a8ccf8a6c4f325bcc7e4e04?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=pw | |
UVF9kPSR9PuW0actRYuPgZJuY%3D", "checksum"=>"1af403317a8ccf8a6c4f325bcc7e4e04", "path"=>"providers/default.rb", | |
"specificity"=>"default"}], "metadata"=>{"name"=>"chef_handler", "description"=>"Distribute and enable Chef E | |
xception and Report handlers", "long_description"=>"Description\n===========\n\nCreates a configured handler p | |
ath for distributing [Chef report and exception handlers](http://wiki.opscode.com/display/chef/Exception+and+R | |
eport+Handlers). Also exposes an LWRP for enabling Chef handlers from within recipe code (as opposed to hard | |
coding in the client.rb file). This is useful for cookbook authors who may want to ship a product specific ha | |
ndler (see the `cloudkick` cookbook for an example) with their cookbook.\n\nAttributes\n==========\n\n`node[\" | |
chef_handler\"][\"handler_path\"]` - location to drop off handlers directory, default is `/var/chef/handlers`. | |
\n\nResource/Provider\n=================\n\n`chef_handler`\n--------------\n\nRequires, configures and enables | |
handlers on the node for the current Chef run. Also has the ability to pass arguments to the handlers initia | |
lizer. This allows initialization data to be pulled from a node's attribute data.\n\nIt is best to declare `c | |
hef_handler` resources early on in the compile phase so they are available to fire for any exceptions during t | |
he Chef run. If you have a base role you would want any recipes that register Chef handlers to come first in | |
the run_list.\n\n### Actions\n\n- :enable: Enables the Chef handler for the current Chef run on the current no | |
de\n- :disable: Disables the Chef handler for the current Chef run on the current node\n\n### Attribute Parame | |
ters\n\n- class_name: name attribute. The name of the handler class (can be module name-spaced).\n- source: fu | |
ll path to the handler file. can also be a gem path if the handler ships as part of a Ruby gem.\n- arguments: | |
an array of arguments to pass the handler's class initializer\n- supports: type of Chef Handler to register a | |
s, ie :report, :exception or both. default is `:report => true, :exception => true`\n\n### Example\n \n | |
# register the Chef::Handler::JsonFile handler \n # that ships with the Chef gem\n chef_handler \"Chef:: | |
Handler::JsonFile\" do\n source \"chef/handler/json_file\"\n arguments :path => '/var/chef/reports'\ | |
n action :enable\n end\n \n # do the same but during the compile phase\n chef_handler \"Chef: | |
:Handler::JsonFile\" do\n source \"chef/handler/json_file\"\n arguments :path => '/var/chef/reports' | |
\n action :nothing\n end.run_action(:enable)\n \n # handle exceptions only\n chef_handler \"C | |
hef::Handler::JsonFile\" do\n source \"chef/handler/json_file\"\n arguments :path => '/var/chef/repo | |
rts'\n supports exception => true\n action :enable\n end\n \n \n # enable the CloudkickH | |
andler which was \n # dropped off in the default handler path.\n # passes the oauth key/secret to the ha | |
ndler's \n # intializer.\n chef_handler \"CloudkickHandler\" do\n source \"\#{node['chef_handler'][ | |
'handler_path']}/cloudkick_handler.rb\"\n arguments [node['cloudkick']['oauth_key'], node['cloudkick']['o | |
auth_secret']]\n action :enable\n end\n\n\nUsage\n=====\n\ndefault\n-------\n\nPut the recipe `chef_ha | |
ndler` at the start of the node's run list to make sure that custom handlers are dropped off early on in the C | |
hef run and available for later recipes.\n\nFor information on how to write report and exception handlers for | |
Chef, please see the Chef wiki pages:\nhttp://wiki.opscode.com/display/chef/Exception+and+Report+Handlers\n\nj | |
son_file\n---------\n\nLeverages the `chef_handler` LWRP to automatically register the `Chef::Handler::JsonFil | |
e` handler that ships as part of Chef. This handler serializes the run status data to a JSON file located at ` | |
/var/chef/reports`.\n\nChanges/Roadmap\n===============\n\n## 1.0.4\n\n* [COOK-654] dont try and access a clas | |
s before it has been loaded\n* fix bad boolean check (if vs unless)\n\n## 1.0.2:\n\n* [COOK-620] ensure handle | |
r code is reloaded during daemonized chef runs\n\nLicense and Author\n==================\n\nAuthor:: Seth Chis | |
amore (<schisamo@opscode.com>)\n\nCopyright:: 2011, Opscode, Inc\n\nLicensed under the Apache License, Version | |
2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a co | |
py of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\nUnless required by applicable law or | |
agreed to in writing, software\ndistributed under the License is distributed on an \"AS IS\" BASIS,\nWITHOUT | |
WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\nSee the License for the specific language go | |
verning permissions and\nlimitations under the License.\n", "maintainer"=>"Opscode, Inc.", "maintainer_email"= | |
>"cookbooks@opscode.com", "license"=>"Apache 2.0", "platforms"=>{}, "dependencies"=>{}, "recommendations"=>{}, | |
"suggestions"=>{}, "conflicting"=>{}, "providing"=>{"chef_handler"=>">= 0.0.0", "chef_handler::json_file"=>"> | |
= 0.0.0"}, "replacing"=>{}, "attributes"=>{}, "groupings"=>{}, "recipes"=>{"chef_handler"=>"", "chef_handler:: | |
json_file"=>""}, "version"=>"1.0.4"}, "templates"=>[], "resources"=>[{"name"=>"default.rb", "url"=>"https://s3 | |
.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-64fd351 | |
46bb4042839800decca808b97?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=uOT4JfToaKkO0%2BwRe | |
0%2BV8OuRZLA%3D", "checksum"=>"64fd35146bb4042839800decca808b97", "path"=>"resources/default.rb", "specificity | |
"=>"default"}], "libraries"=>[], "cookbook_name"=>"chef_handler", "version"=>"1.0.4", "recipes"=>[{"name"=>"de | |
fault.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a9006 | |
7d55bcbe98d8/checksum-b301b2d18594a1e9cc552e2e85a9be96?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248& | |
Signature=jpA%2FLCHxIA6klDnFJYd21LmKhJo%3D", "checksum"=>"b301b2d18594a1e9cc552e2e85a9be96", "path"=>"recipes/ | |
default.rb", "specificity"=>"default"}, {"name"=>"json_file.rb", "url"=>"https://s3.amazonaws.com/opscode-plat | |
form-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-db05ae653e0fedf3c9747fad170612df?A | |
WSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=JQ4CYRqGsnAXn3oYFl6y8zj%2B7Pc%3D", "checksum"= | |
>"db05ae653e0fedf3c9747fad170612df", "path"=>"recipes/json_file.rb", "specificity"=>"default"}], "root_files"= | |
>[{"name"=>"README.md", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e1 | |
8f5854d1a90067d55bcbe98d8/checksum-e82549ca7a038fa004b8a06b12a13611?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expire | |
s=1329588248&Signature=JE8tRgjz8LezYIB%2Fj%2FahFtZ3anI%3D", "checksum"=>"e82549ca7a038fa004b8a06b12a13611", "p | |
ath"=>"README.md", "specificity"=>"default"}, {"name"=>"metadata.rb", "url"=>"https://s3.amazonaws.com/opscode | |
-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-26ee3eb9b3adceb6e46f344c6618a | |
169?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=7f3JoCN3ezOPuoZ5U5QOUKExv%2FU%3D", "check | |
sum"=>"26ee3eb9b3adceb6e46f344c6618a169", "path"=>"metadata.rb", "specificity"=>"default"}, {"name"=>"metadata | |
.json", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d5 | |
5bcbe98d8/checksum-1abcd0bf107234191c48b4121002aab5?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Sig | |
nature=2PvrKHR%2FudYDyoAz15QFK6RmsMw%3D", "checksum"=>"1abcd0bf107234191c48b4121002aab5", "path"=>"metadata.js | |
on", "specificity"=>"default"}], "frozen?"=>false, "chef_type"=>"cookbook_version"}, @file_vendor=nil, @metada | |
ta=#<Chef::Cookbook::Metadata:0x2c613a8 @cookbook=nil, @name="chef_handler", @long_description="Description\n= | |
==========\n\nCreates a configured handler path for distributing [Chef report and exception handlers](http://w | |
iki.opscode.com/display/chef/Exception+and+Report+Handlers). Also exposes an LWRP for enabling Chef handlers | |
from within recipe code (as opposed to hard coding in the client.rb file). This is useful for cookbook author | |
s who may want to ship a product specific handler (see the `cloudkick` cookbook for an example) with their coo | |
kbook.\n\nAttributes\n==========\n\n`node[\"chef_handler\"][\"handler_path\"]` - location to drop off handlers | |
directory, default is `/var/chef/handlers`.\n\nResource/Provider\n=================\n\n`chef_handler`\n------ | |
--------\n\nRequires, configures and enables handlers on the node for the current Chef run. Also has the abil | |
ity to pass arguments to the handlers initializer. This allows initialization data to be pulled from a node's | |
attribute data.\n\nIt is best to declare `chef_handler` resources early on in the compile phase so they are a | |
vailable to fire for any exceptions during the Chef run. If you have a base role you would want any recipes t | |
hat register Chef handlers to come first in the run_list.\n\n### Actions\n\n- :enable: Enables the Chef handle | |
r for the current Chef run on the current node\n- :disable: Disables the Chef handler for the current Chef run | |
on the current node\n\n### Attribute Parameters\n\n- class_name: name attribute. The name of the handler clas | |
s (can be module name-spaced).\n- source: full path to the handler file. can also be a gem path if the handle | |
r ships as part of a Ruby gem.\n- arguments: an array of arguments to pass the handler's class initializer\n- | |
supports: type of Chef Handler to register as, ie :report, :exception or both. default is `:report => true, :e | |
xception => true`\n\n### Example\n \n # register the Chef::Handler::JsonFile handler \n # that ships | |
with the Chef gem\n chef_handler \"Chef::Handler::JsonFile\" do\n source \"chef/handler/json_file\"\n | |
arguments :path => '/var/chef/reports'\n action :enable\n end\n \n # do the same but during | |
the compile phase\n chef_handler \"Chef::Handler::JsonFile\" do\n source \"chef/handler/json_file\"\n | |
arguments :path => '/var/chef/reports'\n action :nothing\n end.run_action(:enable)\n \n # | |
handle exceptions only\n chef_handler \"Chef::Handler::JsonFile\" do\n source \"chef/handler/json_file | |
\"\n arguments :path => '/var/chef/reports'\n supports exception => true\n action :enable\n | |
end\n \n \n # enable the CloudkickHandler which was \n # dropped off in the default handler path.\ | |
n # passes the oauth key/secret to the handler's \n # intializer.\n chef_handler \"CloudkickHandler\" | |
do\n source \"\#{node['chef_handler']['handler_path']}/cloudkick_handler.rb\"\n arguments [node['cl | |
oudkick']['oauth_key'], node['cloudkick']['oauth_secret']]\n action :enable\n end\n\n\nUsage\n=====\n\ | |
ndefault\n-------\n\nPut the recipe `chef_handler` at the start of the node's run list to make sure that custo | |
m handlers are dropped off early on in the Chef run and available for later recipes.\n\nFor information on how | |
to write report and exception handlers for Chef, please see the Chef wiki pages:\nhttp://wiki.opscode.com/dis | |
play/chef/Exception+and+Report+Handlers\n\njson_file\n---------\n\nLeverages the `chef_handler` LWRP to automa | |
tically register the `Chef::Handler::JsonFile` handler that ships as part of Chef. This handler serializes the | |
run status data to a JSON file located at `/var/chef/reports`.\n\nChanges/Roadmap\n===============\n\n## 1.0. | |
4\n\n* [COOK-654] dont try and access a class before it has been loaded\n* fix bad boolean check (if vs unless | |
)\n\n## 1.0.2:\n\n* [COOK-620] ensure handler code is reloaded during daemonized chef runs\n\nLicense and Auth | |
or\n==================\n\nAuthor:: Seth Chisamore (<schisamo@opscode.com>)\n\nCopyright:: 2011, Opscode, Inc\n | |
\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compl | |
iance with the License.\nYou may obtain a copy of the License at\n\n http://www.apache.org/licenses/LICENSE | |
-2.0\n\nUnless required by applicable law or agreed to in writing, software\ndistributed under the License is | |
distributed on an \"AS IS\" BASIS,\nWITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n | |
See the License for the specific language governing permissions and\nlimitations under the License.\n", @maint | |
ainer="Opscode, Inc.", @maintainer_email="cookbooks@opscode.com", @license="Apache 2.0", @description="Distrib | |
ute and enable Chef Exception and Report handlers", @platforms={}, @dependencies={}, @recommendations={}, @sug | |
gestions={}, @conflicting={}, @providing={"chef_handler"=>">= 0.0.0", "chef_handler::json_file"=>">= 0.0.0"}, | |
@replacing={}, @attributes={}, @groupings={}, @recipes={"chef_handler"=>"", "chef_handler::json_file"=>""}, @v | |
ersion="1.0.4">, @checksums={"64fd35146bb4042839800decca808b97"=>nil, "1af403317a8ccf8a6c4f325bcc7e4e04"=>nil, | |
"b301b2d18594a1e9cc552e2e85a9be96"=>nil, "db05ae653e0fedf3c9747fad170612df"=>nil, "710010283d3560b512263d52f8 | |
271aa3"=>nil, "1976d7bafb98f6be15781023e134d943"=>nil, "e82549ca7a038fa004b8a06b12a13611"=>nil, "26ee3eb9b3adc | |
eb6e46f344c6618a169"=>nil, "1abcd0bf107234191c48b4121002aab5"=>nil}, @manifest_records_by_path={"resources/def | |
ault.rb"=>{"name"=>"default.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organizatio | |
n-5beb2e18f5854d1a90067d55bcbe98d8/checksum-64fd35146bb4042839800decca808b97?AWSAccessKeyId=AKIAJOZTD2N26S7W6A | |
PA&Expires=1329588248&Signature=uOT4JfToaKkO0%2BwRe0%2BV8OuRZLA%3D", "checksum"=>"64fd35146bb4042839800decca80 | |
8b97", "path"=>"resources/default.rb", "specificity"=>"default"}, "providers/default.rb"=>{"name"=>"default.rb | |
", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe | |
98d8/checksum-1af403317a8ccf8a6c4f325bcc7e4e04?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signatur | |
e=pwUVF9kPSR9PuW0actRYuPgZJuY%3D", "checksum"=>"1af403317a8ccf8a6c4f325bcc7e4e04", "path"=>"providers/default. | |
rb", "specificity"=>"default"}, "recipes/default.rb"=>{"name"=>"default.rb", "url"=>"https://s3.amazonaws.com/ | |
opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-b301b2d18594a1e9cc552e | |
2e85a9be96?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=jpA%2FLCHxIA6klDnFJYd21LmKhJo%3D", | |
"checksum"=>"b301b2d18594a1e9cc552e2e85a9be96", "path"=>"recipes/default.rb", "specificity"=>"default"}, "rec | |
ipes/json_file.rb"=>{"name"=>"json_file.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data | |
/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-db05ae653e0fedf3c9747fad170612df?AWSAccessKeyId=AKIAJO | |
ZTD2N26S7W6APA&Expires=1329588248&Signature=JQ4CYRqGsnAXn3oYFl6y8zj%2B7Pc%3D", "checksum"=>"db05ae653e0fedf3c9 | |
747fad170612df", "path"=>"recipes/json_file.rb", "specificity"=>"default"}, "attributes/default.rb"=>{"name"=> | |
"default.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a9 | |
0067d55bcbe98d8/checksum-710010283d3560b512263d52f8271aa3?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=13295882 | |
48&Signature=GXU8I9HXG9SE02Gm7T5nYg%2FYzjE%3D", "checksum"=>"710010283d3560b512263d52f8271aa3", "path"=>"attri | |
butes/default.rb", "specificity"=>"default"}, "files/default/handlers/README"=>{"name"=>"handlers/README", "ur | |
l"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/c | |
hecksum-1976d7bafb98f6be15781023e134d943?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=3uAr | |
c9jAFTi4LzQFSN93fpgZmTM%3D", "checksum"=>"1976d7bafb98f6be15781023e134d943", "path"=>"files/default/handlers/R | |
EADME", "specificity"=>"default"}, "README.md"=>{"name"=>"README.md", "url"=>"https://s3.amazonaws.com/opscode | |
-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-e82549ca7a038fa004b8a06b12a13 | |
611?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=JE8tRgjz8LezYIB%2Fj%2FahFtZ3anI%3D", "che | |
cksum"=>"e82549ca7a038fa004b8a06b12a13611", "path"=>"README.md", "specificity"=>"default"}, "metadata.rb"=>{"n | |
ame"=>"metadata.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5 | |
854d1a90067d55bcbe98d8/checksum-26ee3eb9b3adceb6e46f344c6618a169?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1 | |
329588248&Signature=7f3JoCN3ezOPuoZ5U5QOUKExv%2FU%3D", "checksum"=>"26ee3eb9b3adceb6e46f344c6618a169", "path"= | |
>"metadata.rb", "specificity"=>"default"}, "metadata.json"=>{"name"=>"metadata.json", "url"=>"https://s3.amazo | |
naws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-1abcd0bf10723 | |
4191c48b4121002aab5?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=2PvrKHR%2FudYDyoAz15QFK6R | |
msMw%3D", "checksum"=>"1abcd0bf107234191c48b4121002aab5", "path"=>"metadata.json", "specificity"=>"default"}}, | |
@attribute_filenames_by_short_filename={"default"=>"default.rb"}>} | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Synchronizing cookbook sql_server | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:5ahFf54DWNEtmglqYynmBJkhKSo= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:08Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:08Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"ggh+MkAIxT4oWleGOv8M47k | |
Pn2z+DspTs9l8f9m7LhnLkN2xPikvu/1WZZJK", "X-Ops-Authorization-2"=>"SnoRoH5hC/1ZIJT9UXMA5pJejkAIIZKR7LlqudLANQjY | |
UNTQJgyrGXCszMUb", "X-Ops-Authorization-3"=>"ZWsuY8DmJOzsIfg8b2VBYyqDb25YtnhrLr8GTAxG2/Qz35PuAzErauBAmhTK", "X | |
-Ops-Authorization-4"=>"afwkv3uP5cYt8n5OLfp3K6yfeyELceHPxQsXitxMd0AJ5ImkLyEhtvL6Fef3", "X-Ops-Authorization-5" | |
=>"H4/T24F9uQ9avBaiEp5F+sDd5acgd0vo83kjOkW7thE+v7TSkvO2OlZn6lKn", "X-Ops-Authorization-6"=>"Wm064WbF7nzl0WgPsK | |
EhwnFs7QyIjbedUkZ8mwrlOQ=="} | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-395e4cda614b462b151de31f384a4cb1 | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-395e4cda614b462b151de31f384a4cb1?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=uBcBhcD7D6bvaNSEXar7dZoOuiI%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-2ubt06 | |
[Sat, 18 Feb 2012 17:04:08 +0000] INFO: Storing updated cookbooks/sql_server/recipes/client.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Creating directory c:/chef/cache | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/sql_server | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/sql_server/recipes | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:qLcJ6Z055W2mUTUGLMG2W0UTIWM= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:08Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:08Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"I+4XkdmutyF1pY1NTlBQOc/ | |
j6v9KPAUGv8b+ZALvXhMSiOKsw1VGruC8w0d8", "X-Ops-Authorization-2"=>"cm9kLqS8ped7ARWcCKZ1QJknm7GQkGAXcyWQtZ8K+jPQ | |
utlmjpjzI1RtKkh9", "X-Ops-Authorization-3"=>"iLW6kApd6819mLpReZXn/CkX5uWuXupJSdDKaqVNupWpn3x7+JCf5tu+mgqX", "X | |
-Ops-Authorization-4"=>"SEmtHSHe8muxVxWKzSLXrBwNmnG9QW6fGwX4LEKe1w4Dp0L0TSw6HGE+CUiP", "X-Ops-Authorization-5" | |
=>"fFoRlxkfgznUOHPt7Dyx4ivrhncRYIZojCysju2FVYXQ+plOL3kATRQWqCy4", "X-Ops-Authorization-6"=>"LNBp+/+C2UzA/ZvvaF | |
Xi2IcxBARYdoTkoYzwQV4GjQ=="} | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-4e8c4dd49d3996831fa419098943e264 | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-4e8c4dd49d3996831fa419098943e264?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=Uy%2Fsg9rJCzAcSgSLgNJjCnzPoJw%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-9svauj | |
[Sat, 18 Feb 2012 17:04:08 +0000] INFO: Storing updated cookbooks/sql_server/recipes/default.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:bvKhJliPsA5lyAKVbHmDggCGpUY= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:08Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:08Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"qYIYHrekXEtw2hmFHGjq6r0 | |
qNitFhL+m/1MUq5nR8opy4nU+Qb65Op36itRy", "X-Ops-Authorization-2"=>"/pfubcFhq0OG8MuoWLitcn3/gyxuw5aQ4iItn3aR8XJL | |
sLGYx75Z3xao7z8o", "X-Ops-Authorization-3"=>"igRmAoOpT+NNRS+9DzrzJvU9V8OaEEhz18aK0ARKJwWldcFm0bYsNEtN1EG3", "X | |
-Ops-Authorization-4"=>"i7o+hd8MjQMBxPyHy9GwjOUPSET8AeyzCCyexRaamDeLSz37T1eXjSxTGp3U", "X-Ops-Authorization-5" | |
=>"4mJC97Km8YhywXWL+x3D9X5DsbNLh5I2pV0VGT+n6OM+RTWJb6ySc5NI5sFT", "X-Ops-Authorization-6"=>"nI1R44tld80VhdMwvr | |
uStK669geB0eMR1rHmI5x+6g=="} | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-6e96fc65285000fbc04801b8b920dfe8 | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-6e96fc65285000fbc04801b8b920dfe8?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=pI6niNhRZAOfhTkK7MOKAKAcDBY%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-12k3c51 | |
[Sat, 18 Feb 2012 17:04:08 +0000] INFO: Storing updated cookbooks/sql_server/recipes/server.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:dpNo9Nxy1N0P/cWyjLsTiJpd0wc= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:08Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:08Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"HkTKJQ1QIv5FGvrSoyE8cHR | |
gmFc4UzmB537q9CpPbWJ8UwuwlLbX4r1pb/ZA", "X-Ops-Authorization-2"=>"mB7vt45T/kIqZOXDvnjxJOiDByvF8coUNvmxBIexr6WR | |
7HwbhDz95zshCHT9", "X-Ops-Authorization-3"=>"GZCBrxJi2dhzkGJ7ovh2MEUwYgMYkAY3WCfHBSqLDmgCTsdNrWyyMxWaUJlt", "X | |
-Ops-Authorization-4"=>"gFoNUy5svKgTHuwr5z/KxNv1FqmDN+vsqiVsxf2sejHlP5D60jRczPKCEdXQ", "X-Ops-Authorization-5" | |
=>"LlWNoar4BeVOrKbNbtmr+fp3Kb6pQ9q0vBe8Feig6PxjZ+QIFgI2Az8WIVjF", "X-Ops-Authorization-6"=>"1p/bMv1Gh+a/dy9SeN | |
fuObfHArNIEXh1QWv94vEDzA=="} | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-5f9fc3142e6965f2aca8bca763d170ed | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-5f9fc3142e6965f2aca8bca763d170ed?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=gQbZYplhAQQ92QCfkHFld8SsI9g%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-eyw596 | |
[Sat, 18 Feb 2012 17:04:08 +0000] INFO: Storing updated cookbooks/sql_server/libraries/helper.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/sql_server/libraries | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:qNamf0cxcRtPbaHHmskUK2Vqo/w= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:08Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:08Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"mvihJ+1zc6tHaqy+jJZ1x0T | |
PvjWkko00qTJleiD2fXuO3wxher2BI18Nqw3a", "X-Ops-Authorization-2"=>"OiPqa2tDOVMvm1jx0SEc5D56+gx/f0iZO4pg1ZE6zWNC | |
/TUJZN8Oj0diJM5d", "X-Ops-Authorization-3"=>"meUAFlKXTQ+29sWJ4EbsQus2p40aLstXN1V1SA2Mw9KuXln9rQls+k20G9c8", "X | |
-Ops-Authorization-4"=>"ZSefdsq0IHIUfXuDI+xnxf2Pj8D29S0R3dGAaUaPL1uFGBZ1qHxLClHIqroZ", "X-Ops-Authorization-5" | |
=>"WX2OtWG303UOghWLxFYJBIzxcJPS6oiCP3zpGfQqX0MnkXl78H2h2XFS1a5/", "X-Ops-Authorization-6"=>"KS/o20Y3mNLL172FiX | |
r+5F8L3W99qkWdQtoiokv9jw=="} | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-0dad586b72c47622851e9f163aad51ed | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-0dad586b72c47622851e9f163aad51ed?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=bqVZxNW22pKKESuc0Kf9hVDnAhU%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-mya1s7 | |
[Sat, 18 Feb 2012 17:04:08 +0000] INFO: Storing updated cookbooks/sql_server/attributes/client.rb in the cache | |
. | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/sql_server/attributes | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:/hMIG2iDNqYYFQNWPrm2A3yQKfw= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:08Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:08Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"f2Kr0qUNpTIzhY5sgKH/V7s | |
h2gja74LebuKtnndxxbvTkYWueAAyXPviLT9W", "X-Ops-Authorization-2"=>"iseiOeAkhBb7YtGkh2lZn7My5zv+Bfp4ojyfClzPw1OK | |
SSr9NhUMAgwFngK+", "X-Ops-Authorization-3"=>"4lRuEMQ1/DojHvj0ZGFtyXc222GgB3LoPxuNmGW0STAv4BeK6C9OwYk7u9nI", "X | |
-Ops-Authorization-4"=>"gT2rRM03lop/FvNsrmr1ZZXo05n5EdV8tKa5v1+VD1+1rtB7USG7HWDmeCpb", "X-Ops-Authorization-5" | |
=>"jSnzuASOMXJvJZ91rs8/9RDwEI/CeTJVLfXAWkkFJmgaukf7DLnEH+fJDAxB", "X-Ops-Authorization-6"=>"D0DQoSf80eXxvn7tj0 | |
ruUqHnC+GllcRnlwg/cCJMtQ=="} | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-41bfed5c92529a2ddd6141342f4e21cd | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-41bfed5c92529a2ddd6141342f4e21cd?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=sNZ7Sj271gIw5eGeAZs5iOQ6HBg%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-7ag50j | |
[Sat, 18 Feb 2012 17:04:08 +0000] INFO: Storing updated cookbooks/sql_server/attributes/default.rb in the cach | |
e. | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:neKTFix6IA4RvxJrKzNE0+BWHj8= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:08Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:08Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"SYocJi+lqEb3S26aAHezFun | |
PUOzfd7pgFNQSGxrL4ygaxVbERtwI+CIxPESI", "X-Ops-Authorization-2"=>"wr9v4gWB51sC9OmmuH8ZnEWjQazalzLOIaxUaBIvuQ+C | |
0RdBmZxjizzDEI5n", "X-Ops-Authorization-3"=>"ECQN6dyOf7zlS40riGIF6PiKTWrh1LaDN8+aKrKlYZ+2m7ikDi0c6fpGn8z+", "X | |
-Ops-Authorization-4"=>"t6cuQ491nnHeJPggmt2QyRFwlN2YYT8KmJfxNIU4QCcCVwNadMCwO6SzsP/i", "X-Ops-Authorization-5" | |
=>"D7DIkmgrSF0+8rzyfJFpVpK6i6NAtwY8GRF/H9jvq6hjKWd/HTI5HM8NlS/i", "X-Ops-Authorization-6"=>"mMjorBJjqguKhFtmKg | |
QPX+xzJ203P/1uNQmGu7jVDg=="} | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-c05f7b6b32109edbc16b4ec21c47be1f | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-c05f7b6b32109edbc16b4ec21c47be1f?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=SW9sc%2FkAY0fGTHyB%2BHFTmJNouS4%3D to tempfile C:/User | |
s/ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1gigxeb | |
[Sat, 18 Feb 2012 17:04:09 +0000] INFO: Storing updated cookbooks/sql_server/attributes/server.rb in the cache | |
. | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:uVL7S0bow+elJKgm/GHod/c/sMc= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:09Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:09Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"I0nMM79Ow9gESMFLs0r1FHO | |
WfVmbKiXNyiD20OnYMrw4jxtPEVL4etjsTzcp", "X-Ops-Authorization-2"=>"u7jexeoJsvnTf0IlbLFaqzaQNfTBn4CzujE8YTz3fjWf | |
bepo7LEm6a+2mUA4", "X-Ops-Authorization-3"=>"8krSOu6K6Duu3QYDmaW8PIMUC7kzDr7x6HZXdHk62dm0M6FNph/WKEkBjUiy", "X | |
-Ops-Authorization-4"=>"PQqeLCvcAX66f/upTEmxFQlbjTyfaQIO9wx+4ZC9GHcSJcHctuoHCWuswXFH", "X-Ops-Authorization-5" | |
=>"47W0iphwfs2La7NUaVTHt2fNhjHh608oEAUKaguz5JgtgDiKLifiCwXGnznE", "X-Ops-Authorization-6"=>"w7h8FYLS84z8Q3MvZ2 | |
VjOvjVtqh1AKR0R4ay1/k8uQ=="} | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-07fd620a1cdc16d7949df298d1302093 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-07fd620a1cdc16d7949df298d1302093?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=0nwHAGurRvUFE9u12Zb62nrxncU%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-118ty7n | |
[Sat, 18 Feb 2012 17:04:09 +0000] INFO: Storing updated cookbooks/sql_server/metadata.json in the cache. | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:YcemfBgFYGlnSWOKL9M1P6xMVuk= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:09Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:09Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"4aH4deTpn4Oq7jClihTzcTO | |
5ykXjVQ3eOLD5bXi9BaDyjfv979Y1KcS8r/wW", "X-Ops-Authorization-2"=>"p/rJY8Sgq31bnmucBiidfnUn6RqkjQfXOnecNIZWURJ4 | |
jbGlECntIj1H6yRb", "X-Ops-Authorization-3"=>"UOIk5hHxFahoyL7SUz0ouyIgf9GeZMdans04bO85z7vEXvGExqcD4uH+GpIk", "X | |
-Ops-Authorization-4"=>"1mo+0uzkmdFqlJOA/lDCweXGQO8w2cFku/UY+OIahwV9l5SU+xLLaBA8k49z", "X-Ops-Authorization-5" | |
=>"fskZlcH1J59ztC5HC3OH/FkRHVn9uzJpALaMwB7Uch3k8GNgH4xUhk2eMkPt", "X-Ops-Authorization-6"=>"pdk+xeT1gcXCMK7Qlf | |
AOvY2OxegGHtIfwURWT7LGCQ=="} | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-67f100703d5232d93f805c7d26e463b3 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-67f100703d5232d93f805c7d26e463b3?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=efgPuhiNvwGmlfwfDCSRkzHFoi0%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-16w29mu | |
[Sat, 18 Feb 2012 17:04:09 +0000] INFO: Storing updated cookbooks/sql_server/metadata.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:vzpK3JnewELO2FD2kdAvhDw6v3s= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:09Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:09Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"Jg0omnHjK+K0zWf1wBOXkCX | |
pY3Ah/gFTkoR3SeHqXxAwpy+j1Xv80McPjSY7", "X-Ops-Authorization-2"=>"fXfesGPF7iverfUIfPLwN6mWgrboSPT3mMM1Bfp1rYXK | |
dNKLRmbOqI151K3u", "X-Ops-Authorization-3"=>"LubgIjwb6qUgZD26S6a4KbKfTie7MXSbGwgmV95EbmJqfOaA2MqMUsEwS7oa", "X | |
-Ops-Authorization-4"=>"u+Ujp0W5Eh1lZVqJIEUbKx+8v3Hjy3qeUzbmCmcItDAqKU/XC71I7zV9IJic", "X-Ops-Authorization-5" | |
=>"F6a7RbXokaEkdWqZlbb3GGsoht4/wHbuRncnUcyDeR2fiVtb3QfKLRzICVh2", "X-Ops-Authorization-6"=>"TZDIXiEstjTqjQg2K+ | |
2gbd/364w1QKDHHrXkMrgclQ=="} | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-a28df86fd2692d11cb93507571e22b77 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-a28df86fd2692d11cb93507571e22b77?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=pSUnexTehzTMFfQyj1v5ls79WYI%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-y9cmdk | |
[Sat, 18 Feb 2012 17:04:09 +0000] INFO: Storing updated cookbooks/sql_server/README.md in the cache. | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Synchronizing cookbook windows | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:XO8FIWgZbXD3lcAjzP7ipPw/7bo= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:09Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:09Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"X4+q9tYhyZ7i8eraK/JiWpX | |
eC3orlh6JNGpiN7V+NnKk6o16FGMtXqiOZ55r", "X-Ops-Authorization-2"=>"n8kjq7ut8yQ3lED07SWo96S36nhLwMlN+gXGFVw3/jmY | |
1qbETLgmNhCx8klu", "X-Ops-Authorization-3"=>"/5RLG3CmKNn7DLfXMK+aBjQWFcIsUqUgOzG5kSgQBSHmbzfBYQGgRRCFqJtP", "X | |
-Ops-Authorization-4"=>"iD7xiY/AFw4x9rbP+CGpRCxCZDG0xgWDIp2o5QkZF3vRqR/ObPoHwBSOFd27", "X-Ops-Authorization-5" | |
=>"d9tWxq7Sao5eW1FUv2/Yax6/p0cIDw/CFh8278r8TNCtGSzydRyYffy4D9XI", "X-Ops-Authorization-6"=>"uHVsvqS/dfJke1J59d | |
K5aUiBEZMXSd0s0s6rxctgbQ=="} | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-f96479910ab96b5f06315c0ca0b302a4 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-f96479910ab96b5f06315c0ca0b302a4?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=Qq7hFcs2Yz8CQRt8VCgDL6WYDjA%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1psuie3 | |
[Sat, 18 Feb 2012 17:04:09 +0000] INFO: Storing updated cookbooks/windows/resources/zipfile.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/windows | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/windows/resources | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:TWywjttJERC3i4tsW/W2j1X4VJY= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:09Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:09Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"Ndv+i4JNUuakfZuszOcD5Ny | |
bDYdhdiwBhltqgGWw0MBa2HZdtHkxaIVLYk6A", "X-Ops-Authorization-2"=>"ClnGhFrMYbEqtOoy8/XmPBlQWufNkYKICfLmuLReBAJ5 | |
6MsRda2e2r1Tr073", "X-Ops-Authorization-3"=>"kbcq1BviyddorthNDPM1ITZzRr415SCcWB0xDGbpRYb4vKRUpTpjcECZY/Uo", "X | |
-Ops-Authorization-4"=>"iQc2dcPcWm893ep4gKPfFZmLDQ7++KwbeG/z+ibtAE/oUr+aQXV9kxLwsp6j", "X-Ops-Authorization-5" | |
=>"LV2OykryuOmrhjx91+l21LAEpny+31YqcOq6FCY4u7OYFB4mTxFh6QLqdmdi", "X-Ops-Authorization-6"=>"z3qOpgHK4rnuJbLy4H | |
kIsbOOAR6/JPlXQMn12o6AmA=="} | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-5317f17e18e8edf0dbed3b67f2a0487d | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-5317f17e18e8edf0dbed3b67f2a0487d?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=Kk9pUI3vtbQcttnkjn%2BcDb0j6zM%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-evy6ft | |
[Sat, 18 Feb 2012 17:04:09 +0000] INFO: Storing updated cookbooks/windows/resources/package.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:ZCzqueePeQoBgRdhVbc2E2QwcnU= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:09Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:09Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"LyulphTFCVdXap3ik0JbS2/ | |
6LY2anvni96eyhFLIeOH/ZX1HRweGYV9xdt/K", "X-Ops-Authorization-2"=>"PmrD2V3OZSKi2pl8FqCVGrVCE3jM2Mxzdkqh7ya5d8w0 | |
NWUpGt9FHbom4Ari", "X-Ops-Authorization-3"=>"K7aWs9mBtqCFg4NaLfoICYVyrctwPw66wmX8f3kU9lPnMlU07hDl3Hn5nhPJ", "X | |
-Ops-Authorization-4"=>"nyfo/SGrdIASVvbqtPOZVgLjlVq+vvs6aki/n/nS00KPmcOt4iU/SrKPjytI", "X-Ops-Authorization-5" | |
=>"77MM/U1imLuptPdFuCMzfQXUKYHtLLRNqTwTX0FHemQKi1LL8CFvaYpRVM++", "X-Ops-Authorization-6"=>"UJcWS1bPx7225IHCgn | |
d+QlXRROyMMoEEd/BTEoaw2g=="} | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-c58c55315e2898eb773c1bde8d585709 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-c58c55315e2898eb773c1bde8d585709?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=3tQ0YT0Th%2Bntah8hm279FJGc800%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-21skdd | |
[Sat, 18 Feb 2012 17:04:09 +0000] INFO: Storing updated cookbooks/windows/resources/registry.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:8EzBw3uRSIosTfYi8h2xeydja2M= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:09Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:09Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"bTfd3SalWElIrVUy3iUu+JJ | |
5lbgoWzy+26A452fKJW4+5MNBVmQV7Af5BJ1/", "X-Ops-Authorization-2"=>"cmNvTJuS7FaPQ7HnXxjYyv8alx721GmtbS13wu8zUJ6Z | |
nyO3Q7dKttvgwf8n", "X-Ops-Authorization-3"=>"h14MaFOmMmpUMdPvJ6C8CY9ihfuCWJeqlcOdohJYrjLgsi1CRg2TrhLqYRU7", "X | |
-Ops-Authorization-4"=>"bhAWkz03zabznRvwEgN2U9mBaGmkpdt/gpLKpjIPo0PYeELvbu8ogiVINVNx", "X-Ops-Authorization-5" | |
=>"tlvedTpeh/D8Fe7cIcKZy6XFu4CfzYmkEaGNOopslVKmadfzdJouCIJYdyHH", "X-Ops-Authorization-6"=>"WsMMrKDr4SacKBr4YM | |
+UqsDdxV/gEh4s6hCvdw4fwg=="} | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-8916c5b22a18c87947dff58b71b974af | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-8916c5b22a18c87947dff58b71b974af?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=suXa1WlTvHI0o1TmCDhnkosQZI8%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-9aq6np | |
[Sat, 18 Feb 2012 17:04:09 +0000] INFO: Storing updated cookbooks/windows/resources/auto_run.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:saEGOn8Qr8GVLsdGDdQqzmfTMh8= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:09Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:09Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"3qjb/IkRQogRsQeEBifugb+ | |
t4NWahTy7oVoJrgAh0GFhZxLg0xWNOiZfssxU", "X-Ops-Authorization-2"=>"mo9H0XF9+6E/By5MLH91tb7jJFWJS5wVLfxjc45B6iZ1 | |
ulfWxqP3ksGYAwyP", "X-Ops-Authorization-3"=>"9FJN/FycBd8AJnhU1vxCPn2kMoKsdoaXwkA/tc5i8X84BvF8teF62b4Hf1eJ", "X | |
-Ops-Authorization-4"=>"JOFQMtpkWKE3OuFIOmHfnqBDnMedzVpX1+2Fuw6c3JzhKJYfc6/BBvarzN2W", "X-Ops-Authorization-5" | |
=>"w79D8cHHWPdTPv+YpOX1cPR0BalgqwqDaD2odjrz1Tp3IdywWIeLN9kSQF5y", "X-Ops-Authorization-6"=>"S8Lwwb8CDpId1MQKPZ | |
4wBw44Mi1jkwA9GSV+XzyzmA=="} | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-b8472303b776c2322600a0751c815395 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-b8472303b776c2322600a0751c815395?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=%2Fci%2F%2B7kH0CLOaDIwtLpcSVzQpWs%3D to tempfile C:/Us | |
ers/ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1agim4n | |
[Sat, 18 Feb 2012 17:04:09 +0000] INFO: Storing updated cookbooks/windows/resources/reboot.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:1f1shlHN1l+sx17U76UEJObKJak= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:09Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:09Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"AzQ40p4FuSIpWfWEC6va53W | |
BL/qZ2xSWSK/lE/o4ixWleQRMZAeb20YPNIwz", "X-Ops-Authorization-2"=>"hDCZdumT1dV7g/qq356D8ZrEWXzeEx69wkr04Y7+ZRCs | |
Q/3cYWFFlUerJIZd", "X-Ops-Authorization-3"=>"45ptcC9GxY3S7gFCuiZcpUuendrTO/HzjGG508hxg0ITD/c6OJixVeOr+Fnj", "X | |
-Ops-Authorization-4"=>"FL0MndKMCojnC7Ig7Xbhivr3G7E34htjVP4HX7r7wzwPqXQP2dlcGv5dwp+b", "X-Ops-Authorization-5" | |
=>"16AioMar27aXUv7c9XRnfKeOKCkQZDktmLuD60w4wxL7cJuUGm22YO8prcK6", "X-Ops-Authorization-6"=>"AmrWtOLsm+dZGCG2MH | |
YE81EaYsuwsZFgEc33ckE70w=="} | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-848bd700c257e846d1011bda420d54e8 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-848bd700c257e846d1011bda420d54e8?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=ds2sh%2B8O02e%2F73vdTzW8QwPTrzA%3D to tempfile C:/User | |
s/ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1ylef1 | |
[Sat, 18 Feb 2012 17:04:09 +0000] INFO: Storing updated cookbooks/windows/resources/path.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:mG/oWveiAkMfcZ7eASGWwEeXL2A= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:09Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:09Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"p0Bo16nBb/96dzlQs+27Rn9 | |
4INpUnFjTOh0rHdQuGMBmINUraNElDRtn5O7N", "X-Ops-Authorization-2"=>"8IsKd02bWTOlLMfBaDXVrz15oc3HHd9V1me7DuLcY5HT | |
c/Lj7M8gAHrBljq1", "X-Ops-Authorization-3"=>"4nXazGrzBMJOl9lIuQ0yDfInwAO5SbaNVPjx5xamj5q26TJkQLAp1EW2NNE6", "X | |
-Ops-Authorization-4"=>"cVWVRc+AnRMJcFcrOO3SLTgFpDVApt5b2E1nXz1HfUg10CCvtfyXEiFU8Zju", "X-Ops-Authorization-5" | |
=>"+pDfRvntysocwYGpjNZxKhquVxDXEFh/F3JyvCvcOE10Dkg5Lj0j9wO9tKYN", "X-Ops-Authorization-6"=>"ScfOC3yW4qK5NF8cjI | |
kwvZI1Z/sLxm61fRbvXSmY3g=="} | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-53fe31b998dfd009d7b8f58fa2380c0c | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-53fe31b998dfd009d7b8f58fa2380c0c?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=7uziTu%2BWkHNxkHjWiqw54AXCSMs%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-jfvwkg | |
[Sat, 18 Feb 2012 17:04:10 +0000] INFO: Storing updated cookbooks/windows/resources/batch.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:UPJqo7uWQo5KQj9/OYwwLREiBgc= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:10Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:10Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"aBvavBet2HDP64KESK5y0PJ | |
TK85mX0qiQKoQA6GjL41jN7uHdCO8qWNRBlkI", "X-Ops-Authorization-2"=>"4CCPci5726clnuA1tNMWVTS+Rd0PJLHIOBF4MSbv0KGw | |
4T7VyK6dEoa/zZ+c", "X-Ops-Authorization-3"=>"sACzvnNcoa5SwBkj5yq81K4qaegD/xZ/UhgKtwlS5HKruCWZhbBBM/5m/vj7", "X | |
-Ops-Authorization-4"=>"1Qvu4V4DnjghehlBHvYDzxfJYMFR5bGojdv1uvCkL6IyBhFq9QxBSTq8tcYd", "X-Ops-Authorization-5" | |
=>"695dBD5878sVckjRCmwkmXJGj497deTPKesIPN8dTk4jLuIjg613rX4Hrhn3", "X-Ops-Authorization-6"=>"PASNTIN3s2J4etJPzs | |
ogaOwQmPqSx+lmxHpWk6vJRA=="} | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-60e1a5b1b17dfc60285fb28fcd3870be | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-60e1a5b1b17dfc60285fb28fcd3870be?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=UAIlMzAJ%2Bgin%2Bgh9zd9hAvPwgX0%3D to tempfile C:/User | |
s/ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-s95g9e | |
[Sat, 18 Feb 2012 17:04:10 +0000] INFO: Storing updated cookbooks/windows/resources/feature.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:z05FzU2llHmPeVilJZTyLaJDXeI= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:10Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:10Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"k1WjQVmLfGgMVSZ1UaDfgkV | |
mLHQtvHdiZ9JwL7yXxDBPhk3e/ZRi+CCZLQ/S", "X-Ops-Authorization-2"=>"m62KdamvuNgonEEqTRBXD+bnVWX3kj23lha9YjUBPG0b | |
ebY92uwn65sFAu+y", "X-Ops-Authorization-3"=>"A5RJmwAUUeMw2b+m4M8dHnwaIRnvjlScwXBXC11UBOq3re1LLb6nrjJAG9f/", "X | |
-Ops-Authorization-4"=>"28WGASh1Bt5tTgbpDi4z34VxcOZ/n7UOMP1I1Cc+qrf9k0s9yFP/eM/2IG5i", "X-Ops-Authorization-5" | |
=>"OFsbM7FuYERgyrjwgiY9yw5tFiekh1sMGLwOpRGIjtyZdc23NdEAtQDd8/YH", "X-Ops-Authorization-6"=>"UJap6xNuGGOhI6pybv | |
dMZ4S/nEjcL51HnlDCXo8qAQ=="} | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-2c46e31754b7e949a5857e2957bbc255 | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-2c46e31754b7e949a5857e2957bbc255?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=DqYKUVvu%2FlJBgqSDgXV%2B5I0LL2Q%3D to tempfile C:/User | |
s/ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1nmbl1j | |
[Sat, 18 Feb 2012 17:04:10 +0000] INFO: Storing updated cookbooks/windows/providers/registry.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/windows/providers | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:EhCBBVO+UqFTkJ8Gispim1YBRNw= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:10Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:10Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"lDhg+MFoeACCc8D7CZ0bwss | |
kwBi7y7Ik4x1mo291kAV7MUGW9BIS2F0LDYeo", "X-Ops-Authorization-2"=>"Np5uAOK6HJHJg+G952GidhnqseaUAuR7yFAC6WIsAnTw | |
59dl6TpfZgSo0rrT", "X-Ops-Authorization-3"=>"oUKARXUGtfsvs5KUFccx+C+EyRpqVz9GKYPZqMo5T2Q6Y6+Ckk5Rr03wgAN8", "X | |
-Ops-Authorization-4"=>"xwEuy3Ej2mG77Zo1jT358MQ4CSFFHKWPcD3ObEvFLlHzX0Vg5HygM4FCCvG5", "X-Ops-Authorization-5" | |
=>"4gpBl7WZSf8zEbOuer8JqvOCdmIsIB+d6w9Qw/YVSN+HbzkZTTNYqGG2n68C", "X-Ops-Authorization-6"=>"OJNubkbtYm+eVLQmz+ | |
SG5+sR1qO87mL60z6DlSxZQQ=="} | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-f52bafb5e9ce97d2a7258445b6b56406 | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-f52bafb5e9ce97d2a7258445b6b56406?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=a1l8JU0thZ%2BzJSOPi5KjODH5HUU%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1bzw54b | |
[Sat, 18 Feb 2012 17:04:10 +0000] INFO: Storing updated cookbooks/windows/providers/auto_run.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:MdzrBoCHVMANMm0H8fjENs3lHWk= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:10Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:10Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"Ml6DIvrcKjolxafhh3xZwX4 | |
lh78NY2tgvdZcPZtHEM9yn+SKrHzfbRuyOKpc", "X-Ops-Authorization-2"=>"N31HfOmrHCQKWxooDyvzztXd9H1V4iKRpTu7DgX4YvA1 | |
nnBqEsXxlLa3oCZO", "X-Ops-Authorization-3"=>"F1OAfwd6rx+7MCpRZryjG68Fa7g0cVHzPdrCMMDWGKcnsIePvKmdbqCTniiv", "X | |
-Ops-Authorization-4"=>"31TQTO3qRH8alM+15KuidnsfFOGxmC0Iy+pHE68WQ+tlj77jeBu/FT6/PNvV", "X-Ops-Authorization-5" | |
=>"WLmmAgt0qz4+T2kfXeY5nTAJ5AC/s4adVaO4wHwK5v+aKHL8bOxko36u4WhC", "X-Ops-Authorization-6"=>"0ZNoki7GiPqf+S4Wf2 | |
iz44ee/0dAAyh9oLK1sKJEgA=="} | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-271dba97116e58581ea4c650386dd8f3 | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-271dba97116e58581ea4c650386dd8f3?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=PnG8iJNzgPFoOWGHrfZrUreMHLo%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1hiiv6s | |
[Sat, 18 Feb 2012 17:04:10 +0000] INFO: Storing updated cookbooks/windows/providers/path.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:AM43mGc3fjgBAYttEy0x8TM5h9s= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:10Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:10Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"00mL2ncZdURmNyotd7zFnpD | |
nwZ6Ixx+JTuOrWPeMdRWMWzcv5NYZKecZCiG9", "X-Ops-Authorization-2"=>"oSIrDrirEBoL7QlA2BYRW5CEAT5t+0VuuguwxFf3Gn+e | |
Eu4jXoAhaWVJm/4/", "X-Ops-Authorization-3"=>"5HUbVVUyhWMN+ytJw1mWUMhhCWw5Cuqoj/s8G9QarKC3MpjNIZwKkn5XIND+", "X | |
-Ops-Authorization-4"=>"yX5oCm/Bk5DB8/DXldl0FLn3nuG3N6XVn8594IYmNKGe+rYE8BR9G6w3zvMN", "X-Ops-Authorization-5" | |
=>"YXo1ETqaCKCrlcbX5jrtikEaTc04w/7NJd0vgBk0aoydyRFB5hWLmRL0k/5D", "X-Ops-Authorization-6"=>"EdQzN0Rvho203Gsgji | |
mEi8A5L92pA88Ru+AcrFSrPQ=="} | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-e58459cdaff6ef1bafb9fae64dffcc86 | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-e58459cdaff6ef1bafb9fae64dffcc86?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=etgh%2B0ptFnOwNfiW9sFopDqN7a4%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-dyzpnu | |
[Sat, 18 Feb 2012 17:04:10 +0000] INFO: Storing updated cookbooks/windows/providers/feature_servermanagercmd.r | |
b in the cache. | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:JopVz0ITiYkkDHj/Ds2T3Fj1zfI= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:10Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:10Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"ltpIT9jisuiGnosYS04aPzq | |
N0UDv6IzCvwMbwprL2slKp/2tj3WZHq0j+bEi", "X-Ops-Authorization-2"=>"l5OXTPjkGMl1lwz0GH9UGN0m6Jr4I2Wv8A3aAoEA+Rdx | |
sM1UJBEimk4094SV", "X-Ops-Authorization-3"=>"gQly+sR1DxHUZewcbTe4fUSXrBiRMLOqsgTP9TAIoqH7540h9ZNy1EnHIiS/", "X | |
-Ops-Authorization-4"=>"rm3oVIu07BO8grmkL2raJryMpK3ITkATbnuuyyA//kJDYNSYHx/iUeZG+bNZ", "X-Ops-Authorization-5" | |
=>"05SdPLtlMFK5tTH1/BQ93AN++0Cu55CDvwrUlAAdySosC/ejk+FUvYnuhBfb", "X-Ops-Authorization-6"=>"OyMub4xLZ+emaUVvk1 | |
noO0oTvtvmNyRF+CUzltY2Nw=="} | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-7859415b67a1db7633695b1acc9704fd | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-7859415b67a1db7633695b1acc9704fd?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=jkzyZ0b33AWcOr1t5r8ERcVmBg8%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-13oi1ec | |
[Sat, 18 Feb 2012 17:04:10 +0000] INFO: Storing updated cookbooks/windows/providers/zipfile.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:UvNBy1c24udefTvp+CUJJKvLahs= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:10Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:10Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"EfHXg5xFMQiMUkg8a5Hd6d9 | |
wyDor6eO2G13uYXcs9bka2szmFPWdC9akSxX2", "X-Ops-Authorization-2"=>"B7JuMA/6nXXlOmWQfAzdYCB/tzJIAqXE7OCVld0M6duJ | |
jZDxpRrb7taHD5qM", "X-Ops-Authorization-3"=>"39Y5sy9GpTsZtQ/NMZb5BKpEYQS6A5rhCJYBsWxymsSUQH87d72sSmaFIE0b", "X | |
-Ops-Authorization-4"=>"d2VgvITucuegZ+uNEYS3KZh7lCXQcLimS4hRxSCGk8sMr7LS73XS8mygaLl6", "X-Ops-Authorization-5" | |
=>"LAqFNqmmut7Hjpyr68n81+i5LLipY6eue6a0In+HPi8WSxXT7BfUNmjA4N1h", "X-Ops-Authorization-6"=>"Hwbw2WLhOmdwduq0T6 | |
PWcWZWaYBhIrigKh9zMAti9w=="} | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-6aca1c8d5a8ad48c260e264f598e9bb4 | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-6aca1c8d5a8ad48c260e264f598e9bb4?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=EDnAPMUn1Ox88EY7Q4VB0Ll55W8%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-sls5f4 | |
[Sat, 18 Feb 2012 17:04:10 +0000] INFO: Storing updated cookbooks/windows/providers/package.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:uAbwASf/TXas2wm5fEt7SIGcTcc= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:10Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:10Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"Q9nvKhy8x7ZFV0HA1HYSrr7 | |
Paa3gQX+2V5doh1hfpD1wofdRGKy0coEcSi/l", "X-Ops-Authorization-2"=>"8pzNlkKF9qGnO5zv+r0TNFIr/LKShOmUrGNXlGOBafwU | |
ytF/lIVeg6BKRkEX", "X-Ops-Authorization-3"=>"LvgT7VM5sJLIbG1UE87ibqF2bSLVIMysZzGsRiZyyds6JEsha8pNaM85OfGK", "X | |
-Ops-Authorization-4"=>"XAxKgeLoBcGwEh1SXSpZ8fRogC/H5oTRPEg/OwKNC1VBhkOTczGACooZV3Ql", "X-Ops-Authorization-5" | |
=>"hpIWrKTX/5zanSbZSORVCTKAvYPFge5XHxFO8Z9yMS9/W/v8aCSBD6vL3fta", "X-Ops-Authorization-6"=>"OyVxVtj3VRxTnD1aDa | |
qd56kX0Jh7BTDwGOoQz72RnA=="} | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-4b487ea5f4b20a2b17c761badcc55cfa | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-4b487ea5f4b20a2b17c761badcc55cfa?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=1rKmNBsU%2FB50BxYzobpAIQYXBAQ%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-ncav4f | |
[Sat, 18 Feb 2012 17:04:10 +0000] INFO: Storing updated cookbooks/windows/providers/batch.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:y0J+UV8RIeIAT2cXR0g4LdNe/+E= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:10Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:10Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"dt+CHP8dsYnk18v1uORd+Dm | |
xFu0J+rfI4SwQTPbQfiK6D1URwC27/m/AdtwX", "X-Ops-Authorization-2"=>"oZ+sqpsWmx5GWbmXRLmwpF+/Wed64qERElf17tQUwa8r | |
d01B0zt60PqeKOEW", "X-Ops-Authorization-3"=>"LRZa+JXVpjqAn1qQIjkovV+6LEL4SqxRmGj7ImJMLN/c06DXYMXCNwl/tqMj", "X | |
-Ops-Authorization-4"=>"wITPaX4X3nBx6L/6I8ca0L96bTnTNfuzVFOBIH4kUBRwl+BBO6otEW9lS9aH", "X-Ops-Authorization-5" | |
=>"dLyrgq3DUEAF9BrXZAy25cTBnMCGtD7w2GoS5AEYrylb3kke0REJAu0ct/O6", "X-Ops-Authorization-6"=>"UaFXAWlLDDV3avFGro | |
38RHRC4BymN9dsY31iqmU8wA=="} | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-706f2a6b16ed14193e45c3016a71a0c5 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-706f2a6b16ed14193e45c3016a71a0c5?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=NYNHRzg20otEnu9PqfCRYrz96DE%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1twtl5r | |
[Sat, 18 Feb 2012 17:04:11 +0000] INFO: Storing updated cookbooks/windows/providers/feature_dism.rb in the cac | |
he. | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:dzQwL02Mf30OX2AOp+9XfGgJhJ4= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:11Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:11Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"Qwyq5UedMF3owkQkcUjtLZT | |
JPkTKE8af+V8xQTDyYMsS2O8XTM9vrJf4KFkL", "X-Ops-Authorization-2"=>"FYVXwXin1xDhvdUAFhpnAhTOy8VIx70SUOQc7gBkhXpX | |
G6MRjNv10BTillZe", "X-Ops-Authorization-3"=>"mYyZSKr9fxD4J9J15Wz/m/b9DztV8tuUENdEHsW1smc876EYIGAE0NRlCWyP", "X | |
-Ops-Authorization-4"=>"TsOEfo889fb1v2bz8XOjAGwYf9h6H3RZtsC1mw4kJDBzNc0KjFLYmHoFbxGy", "X-Ops-Authorization-5" | |
=>"VUFgy2MPBWPIbtGiH09xSC2YUwbm/shXGeNaZuwylrm0BcYURUxZc/WsLfvr", "X-Ops-Authorization-6"=>"CJmTx4U+3VW3VsOaxz | |
9JB+qdRpHj0ZRsyQmTKg3XKA=="} | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-aa71d112a4856c8aaf422c7e8503e971 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-aa71d112a4856c8aaf422c7e8503e971?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=RyoSysJRgZ3kD3VRmpFo0XhifJ4%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-115b3vc | |
[Sat, 18 Feb 2012 17:04:11 +0000] INFO: Storing updated cookbooks/windows/providers/reboot.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:mNWII3asKKAnHQks/JVJnVeO/UE= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:11Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:11Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"NPEAKCzzsJS1yRlQi6nCgc7 | |
YfLUxwHuAc73KYNkm/nFeBTSvcwS8cG+hJanw", "X-Ops-Authorization-2"=>"7LwuTWIFww58dQ18uTaVq5UgKRdEq/A0s0gjP7Lb/dC8 | |
w1EyVYeZVT4bPoxH", "X-Ops-Authorization-3"=>"5nenweUAWo+rebjUFxGIsG4CQKgr9klIDolZgu/iwpcG6wUA27SXel37kk9g", "X | |
-Ops-Authorization-4"=>"YG4KcyX8QLqIiBFBrU3WDUXEsZARQX9zvPoAExLtqgTMoFPi1ddcaX4pt35w", "X-Ops-Authorization-5" | |
=>"y2XejcB25Gc2iGDV9IqgOCui9I0beGYw8fE3sDK58jRE7g6miWht+4eAkryM", "X-Ops-Authorization-6"=>"LGElSyqdHcgm5FX/KV | |
0uXeMz1x8pu6cMyIVX2eVcMw=="} | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-b8f4746c0dc02ee922751006fa0b9c3f | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-b8f4746c0dc02ee922751006fa0b9c3f?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=KedGzMRkiQl%2B06ul%2BNZG6X%2BgdvA%3D to tempfile C:/Us | |
ers/ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-q2solk | |
[Sat, 18 Feb 2012 17:04:11 +0000] INFO: Storing updated cookbooks/windows/recipes/default.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/windows/recipes | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:x3xaIFoM7B4DJe4DI3v6gL/JxLU= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:11Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:11Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"w7u4YyousigZz/Qw4II7RUn | |
Gstmd/a1bsM5rFBIvdK+iXUvqONfCfR7eH1D6", "X-Ops-Authorization-2"=>"Ywdpq3l+EmGTC28FiDbWbczyVQxgIpo4SXx86+o1d+ET | |
O9B/3ETEHyDc4qMs", "X-Ops-Authorization-3"=>"S7Pftl3t44QZu0fXU3kwKdxwVH1yJe9czAwGmgeB+KQIk3MHChF3OwSXTxCm", "X | |
-Ops-Authorization-4"=>"kjIXBaxB6bZuqeXljnaxVr6N/xr84ywm+RT9NDRguPCbVSFrShIDtsI8muCd", "X-Ops-Authorization-5" | |
=>"LvXiONPruQkLOwIR0dpSyrzOkpwfVzNAfO6S2FKWW6n3da159x88mj35ZrHH", "X-Ops-Authorization-6"=>"D6OcCzgcMmTaOIMv6w | |
HHSMBxawiWoV7Y6hTyOxJmvg=="} | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-a55d8ab514d9d9efae136a872711f80f | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-a55d8ab514d9d9efae136a872711f80f?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=mIziC4oaEAS3MdlZ4EHUQMdjOH4%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1tel8xi | |
[Sat, 18 Feb 2012 17:04:11 +0000] INFO: Storing updated cookbooks/windows/recipes/reboot_handler.rb in the cac | |
he. | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:r4WAELA/siorVId4TdQpSF/ywXc= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:11Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:11Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"C73BaVaBpv4R8MOROOgnKvp | |
MHL34j/AKHYITyeX/QyToKW/cPFmkZeTKltim", "X-Ops-Authorization-2"=>"euMwQOwXK3zSX9iwZxCzH3a1ciD/V0DAlz0e2qKLaFsG | |
YgWvYSfzPL4Zetp7", "X-Ops-Authorization-3"=>"duV6AmwZQ/qNpV1PaT/v0VNU4F3p2RFxNNrEsRHwwSVpXLzHdKDZDxchR32W", "X | |
-Ops-Authorization-4"=>"O6yYUee7iUDSJClfH8gOqYs2Wx6c/OHI6pFrWMDhdGi9YtKQBGLiUnwjO2eW", "X-Ops-Authorization-5" | |
=>"yI4hdXsqEzK9Hj4S4EUZBbtGuH/CKZGv+yUEmWDzVLpQ7y3qfpJNO327dmwg", "X-Ops-Authorization-6"=>"ihT5MBKEVjIVIBCrPa | |
8ML0StgHPi0gQY4JkmPRm3bw=="} | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-568fe3411d4a69f1c3c9b32780b24cf7 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-568fe3411d4a69f1c3c9b32780b24cf7?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=qFm%2BeREpTVIBnSFK%2BDKjWfmLpPQ%3D to tempfile C:/User | |
s/ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1g1xd7t | |
[Sat, 18 Feb 2012 17:04:11 +0000] INFO: Storing updated cookbooks/windows/libraries/feature_base.rb in the cac | |
he. | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/windows/libraries | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:Iind3eBT5h1hlNhnfrMoT2ayTAw= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:11Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:11Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"pUsKTQ+aKI0Qb9205Sc/jVE | |
uNIiK+5cA5EmULJyfIwnUdC4f6WadegBiEcwc", "X-Ops-Authorization-2"=>"2XT+87sKg3yxY9LpavSl7y0Lmb9TUitYVv5bfFOp1f8z | |
SHj7J+w410BIJvgR", "X-Ops-Authorization-3"=>"bxexl6O3OvKQOvPDCQg9FYfooVuaUwfTQCdpNavSAMQutB53b8rzR2jDnH8n", "X | |
-Ops-Authorization-4"=>"1oLA3uS8qD8EyiXMWb7iuMUBIu4mnlBSoR3+r4VU4AxGmCI9xqW1O0d740jW", "X-Ops-Authorization-5" | |
=>"i/k3+8a7/FGWqzrPjwy0PPZ/EiLxcB6BusJNpFz2V+OXqt4lXXofzbX9UsZR", "X-Ops-Authorization-6"=>"h4ND/IUjyaBb7L7pk+ | |
6vklFenK6fNUvoe+UtNGXJwQ=="} | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-76f502ee18c89d7beb68e7f13ab0e9c0 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-76f502ee18c89d7beb68e7f13ab0e9c0?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=7eiaV4gS4XGC8e46twRX7fNUgIc%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-121dlt9 | |
[Sat, 18 Feb 2012 17:04:11 +0000] INFO: Storing updated cookbooks/windows/libraries/registry_helper.rb in the | |
cache. | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:ls814imHEBCtqorz+lvjGasUwy8= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:11Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:11Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"Yl/55e25plT+e273GOBXgTu | |
/pgqte5ivw939SQxuAx7iVdu7vdPQPIu89BVN", "X-Ops-Authorization-2"=>"f0enzYPABwsOM95sRHSMV+Wap8ecYiu6God2xMpCawrz | |
/utjpBkEZSjp9WnQ", "X-Ops-Authorization-3"=>"gpKmOthQKv+T87/WdTjmE+xcB3QoZcOssTrqBupl+V2XrMXJEsFGKgEmTh6w", "X | |
-Ops-Authorization-4"=>"Kz4OySQxFvlQqOmU+nOQ7MP1t86OpSMiBBGjdYVJTownarTJ+bWN7ZtJW35f", "X-Ops-Authorization-5" | |
=>"PSLHluLbgqIRuHy6FY6495JwikiZ6R8/GdDNhAIPpsnt37TY2MA7kZyLLqRF", "X-Ops-Authorization-6"=>"9hoY3arcpWitLiEzNA | |
LIuEaQ2BI/u8KHNUsCjcpJWg=="} | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-cead86571eaa50734abbcdfc608025fd | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-cead86571eaa50734abbcdfc608025fd?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=nqwmQDawggxfeZRUVxC7Or14nNw%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1mlwdun | |
[Sat, 18 Feb 2012 17:04:11 +0000] INFO: Storing updated cookbooks/windows/libraries/helper.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:CZMmTkzY1M281uBNMZyW7K7I4z4= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:11Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:11Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"8CF5+6nGWI7G8KiaREQZNgN | |
fsCEyd6GJfm/84O/daPM85Da6vRWZ/jx+rFj1", "X-Ops-Authorization-2"=>"zQAoz+k4MsebP+TM8fOcFnDi1tPZA8u6bZJO2VrVFvIF | |
ycrZU8ZVMa5fsCgw", "X-Ops-Authorization-3"=>"e0VQdIv0zyEkQtvGNgqPfWlRN4mlkL9FWZvHU3lCL6CkekfP3vmGLoCv4e8Z", "X | |
-Ops-Authorization-4"=>"lGGBt9tDU6NEqQuVOjz0G028Td1NMjAKUtVUM2k9gw0zisto8RQGO8R6ilgW", "X-Ops-Authorization-5" | |
=>"n1ilGYAk6RUCvx29Al/wPybrsGeR8XVCmIbIiG1/8JVlhTBFZI1YJCovftAl", "X-Ops-Authorization-6"=>"G/PKO1XuBhpcbau8BX | |
OtB+mAmjfBX9dy9nD67JH0iQ=="} | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-724ecf2579c182dff0f21a92b262256e | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-724ecf2579c182dff0f21a92b262256e?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=nDsYVKjkkl2E%2FrXJSv4vjWjneGY%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-6f86af | |
[Sat, 18 Feb 2012 17:04:11 +0000] INFO: Storing updated cookbooks/windows/libraries/windows_privileged.rb in t | |
he cache. | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:INGcSeETOtEjqWQfxEQ+awo4/VM= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:11Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:11Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"zeIMs2rsmpdGFRIzApXbiC7 | |
ptNnff4smr7iEQQ51yov5epW0DauDLzo2etQ6", "X-Ops-Authorization-2"=>"e26BTljpgBu9vAh8KyL+MCgYJMecpWshPWbw/oBcDVfi | |
MLZJdzixX0YQJPYJ", "X-Ops-Authorization-3"=>"4L71S4v8Ad6fP8EIXg+I4x7l87uTX4G96lNDddqkqNbOQcZH2xuzfTnQyCJP", "X | |
-Ops-Authorization-4"=>"9yUmEzgCjZRYlX3t7O4d8DI5dnmpZIsZPGrMh2mO+bnoKFrhlHlviwpDPZrH", "X-Ops-Authorization-5" | |
=>"jYvaQkPMKQbu5HgrbJd2adCldPufOQFTesAVpt5/qEkTASxJyjvtKgNypm9J", "X-Ops-Authorization-6"=>"Ygzhu6I2M5Nxaplh8b | |
uhHLBqTeCeBqiFPpI9CwLK2g=="} | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-9b20966748f370b153659189191c3859 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-9b20966748f370b153659189191c3859?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=mpkkFFnwcaYqQwHOZA2AwP30OZc%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1xwjnvz | |
[Sat, 18 Feb 2012 17:04:11 +0000] INFO: Storing updated cookbooks/windows/libraries/version.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:I8U6QHTCrqZNwZGjdpF+STTJsIc= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:11Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:11Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"pzG7323oC+8ppAJLRr5bEt8 | |
FYgO/l4U8H3oEFP0HVY1KU5WWg7lpomnlOS0h", "X-Ops-Authorization-2"=>"ZEBkZnr0k6LozH+tKsIRdKAfrD262nszYjA39Riqh7mJ | |
xBQelnLHefQYWZHo", "X-Ops-Authorization-3"=>"IxXp+i6yikOysP2ORC/DKkBe6IlshhcEj3Imr+7VDD9358oiKVcsMJNfPkZr", "X | |
-Ops-Authorization-4"=>"RUrtN9sf2ZyIRhgFd+ElfSlKoL8ySCbbHOJqsQcApEL/Fq7kuVV4FOtPhFTx", "X-Ops-Authorization-5" | |
=>"udLoVOAYpUd5EJoxPfrLUbAtvBqwWt5NCnXUVClgtAer6dDmfC/ukn4yubDU", "X-Ops-Authorization-6"=>"jR6rkCq0ZGtbwwCO8k | |
Xa2GyIKC7xY3BDbyL+zMUxlQ=="} | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-6b1e4d953a821a36e60a3a434783a42b | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-6b1e4d953a821a36e60a3a434783a42b?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=G9RyT4s5spgs4NKsCz36NmjLsSM%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-14c05d1 | |
[Sat, 18 Feb 2012 17:04:11 +0000] INFO: Storing updated cookbooks/windows/libraries/ruby_19_patches.rb in the | |
cache. | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:/M4TRdR/onAR0j5lDbehNUnjkWE= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:11Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:11Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"EZvOANM49Zovl+jyyV6mFyc | |
ZE7uKJqfV49aV79Kj2Q5w7gyTqa4c6c6QN3ch", "X-Ops-Authorization-2"=>"MRKsVQBPjGc6XhbGA62LB1eLINgdAXpiQKixhIviowBI | |
4Gpb4NKIFOxqq8Kq", "X-Ops-Authorization-3"=>"CBknSQfOWKgR2nCBYOHFrTWtO7twMAcGy67BUrQMVpZHJTFByY5rOCpp7ShE", "X | |
-Ops-Authorization-4"=>"udaAi5y0LWOBQOZIQmHWkRPK4ShJp3WZqp09UWZ0+7cmkS5zeeGtrkmtKncb", "X-Ops-Authorization-5" | |
=>"nOl7U6miij2tlAjNcYY1a48dhtlp7BE0z0vDmFL8P13sXjzx2SUYMG2I8tK4", "X-Ops-Authorization-6"=>"ErvqhNrVUhCaAI6kKy | |
oaU5ha8PEv+2Xy1LHCxaL9TQ=="} | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-eda001f275230230125ff1c8dbcd01af | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-eda001f275230230125ff1c8dbcd01af?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=Dk%2BTtSA2bjxDl0sVU4zJUrZnfpE%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-17vappi | |
[Sat, 18 Feb 2012 17:04:11 +0000] INFO: Storing updated cookbooks/windows/attributes/default.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/windows/attributes | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:quxyGZCQm7794DxCnWsP2wYj3eg= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:11Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:11Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"fTCL8dAsGtwvJJb7gMQOKGo | |
RayaV+s3+7uYqrUXqbCZzbvtcEMAVExm/qI3X", "X-Ops-Authorization-2"=>"42kubc/MkF6NN0E1B09fwO474rGFZ/vSjIV5AZ/Q0ueh | |
zMaOLZbPdu7qNNTn", "X-Ops-Authorization-3"=>"R+wG9b6xI6wLhTJB0ZFbJxxvcZa4Tt5fq0ct09YyNHsfyQEjrypi0EH0knlr", "X | |
-Ops-Authorization-4"=>"A1LaM7VSqqzpPIlNNLT2adMOHBmChjoc+PD09cANdVw1BHiLN+n8KKpnPJ2V", "X-Ops-Authorization-5" | |
=>"bfDeUNdikbe7E+B32QXmi/wVLR2Tvr96qezoke4D8Z5e/aNZ+11RydkMTRdG", "X-Ops-Authorization-6"=>"Qwi6Xh5P0BKh7BvoUj | |
6zUpkPf93tSL9YnufI4g+lxA=="} | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-d00cacbe68f1a7257ca40e0ae89293d7 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-d00cacbe68f1a7257ca40e0ae89293d7?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=jNiEbHYq4b%2BVzm6FDiD8n1H7OnU%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-8g6wre | |
[Sat, 18 Feb 2012 17:04:12 +0000] INFO: Storing updated cookbooks/windows/README.md in the cache. | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:TFyjdNeisk+kekYFmHivOpIH80Q= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:12Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:12Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"5Wy2oHm40DyCxeOIvUuxWzO | |
9xjNSIw+9BRruMyO8B66MOU6mIEv+WYfdD1uz", "X-Ops-Authorization-2"=>"poqa8362CNPQlI0ToQXaJMSq92krdLlXe3SvtJW3g8zd | |
jceX7EUrMAWnt4rP", "X-Ops-Authorization-3"=>"kmOa4aSPDpGakUbFvmLz/jQNQARLFxylwrP8Z8bqQm7ipja0fRcwXMDed5LI", "X | |
-Ops-Authorization-4"=>"SMGWtrHiatxHEFdvFHjF2eMdDBh9rY2bZAFtRJWydXf1oQwOE22MeUm0/jAD", "X-Ops-Authorization-5" | |
=>"/GJn/SPdrGKbFVk9vmHPW/3bp1AGBbQNTuz9JynAr4kTL+PUvn2mv0yiP5Op", "X-Ops-Authorization-6"=>"eYsJ2VFRprfXCUp93V | |
sX8e8Af5DLunsM/sscGeLmng=="} | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-fe5055d81afa103bc3e47692daa2aa9f | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-fe5055d81afa103bc3e47692daa2aa9f?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=6ZJpwHTTJA0R1E6mAls9%2Bb2%2Fw7s%3D to tempfile C:/User | |
s/ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-rbpqnz | |
[Sat, 18 Feb 2012 17:04:12 +0000] INFO: Storing updated cookbooks/windows/metadata.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:N02nZe7nHb/xnLR/BqIcFPugUKY= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:12Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:12Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"qjhkyCiW5xjA4Oi/AEcpKxU | |
CMimHlmhIjrlBHNs2aO9WQ5gKGgS5eldy9I3Z", "X-Ops-Authorization-2"=>"M5fkkCiG3Pks/Nj5tlvazvgkEX9kSx3XFvYk3HgFqMOQ | |
vv+WAkgJnEm5ygMT", "X-Ops-Authorization-3"=>"GL0vXn0BUoPqc2y0Xg+/s/VYbAqr3zUeBY1J33zdau+FKmEoDmu4/qT3khuN", "X | |
-Ops-Authorization-4"=>"dDZYXuVV+2PxIlabsVpLgxooqsRKwHWvJ+ByklpFdNhcrSbmrhjzEAw5JDVo", "X-Ops-Authorization-5" | |
=>"Qc2gcyx/nC8K3SKhnmlJQ3vNDakofr3420hAB0AlHG7p2S1XK+7IdpckQoba", "X-Ops-Authorization-6"=>"IrElCmj2sBj4OoXKPR | |
mZWvA4D+BEH7JkDB1X1IEwcA=="} | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-64a0f1e6dafcaa4a5a5077a0dd07a430 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-64a0f1e6dafcaa4a5a5077a0dd07a430?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=%2F910xraF%2FCEOqCZ%2FnNdIsLvNTUU%3D to tempfile C:/Us | |
ers/ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1vwpyxl | |
[Sat, 18 Feb 2012 17:04:12 +0000] INFO: Storing updated cookbooks/windows/metadata.json in the cache. | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Synchronizing cookbook openssl | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:oFZnzEjNP5/lQ4DfeGhpOM+zk4o= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:12Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:12Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"upPOnWjoepy9hdui0ncsxj3 | |
wJ/nfdVpA2tgKv2lFMSTV8AMuTHFeBcdIfzG+", "X-Ops-Authorization-2"=>"bjrH0O5W3UxkaXIEhxEMuky9CvPGJJVxXaq2FSWdgT3D | |
L+21sImlPJsQTuOI", "X-Ops-Authorization-3"=>"Nx2nuNgCGQrYa/KmQxPbD9gwZT+OGJ0xBq77i3g8Kzol8I3444tCSIU6Xsnd", "X | |
-Ops-Authorization-4"=>"pQGxhVqmv+zsoZ9EI1g0UdDfxeagSmkd5XjSTUIeh0MoU93EKjCKZTeFSMw6", "X-Ops-Authorization-5" | |
=>"x19U/jjflsGRBcK9KALz5ysp3nX25pmVBbyw2Yt3wR6HiBl5jDogtjahsfnq", "X-Ops-Authorization-6"=>"nqORVokwePHv0Xgf/t | |
fYdr1kXflpMfAcf0zVQvoafg=="} | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-cd9b688975824954297838f7d4214b7f | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-cd9b688975824954297838f7d4214b7f?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=C33j%2BGfpAdRYwpWWJ%2FpB2S8VSwc%3D to tempfile C:/User | |
s/ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1sxf0yt | |
[Sat, 18 Feb 2012 17:04:12 +0000] INFO: Storing updated cookbooks/openssl/recipes/default.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/openssl | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/openssl/recipes | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:NmujkbKHtqgYZMs3fvWO37TVQVk= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:12Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:12Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"LEG/sb8F70ft0Z1DKeYMtg4 | |
cyEQT0MJTWKyb3s4r5WQ/hk/GPpX2hgY9ZUQH", "X-Ops-Authorization-2"=>"l4gUbiumDOZDuZFbJObErIsZT1KZGOZYXxaNtBR6v8/y | |
CaKOhUTIAA9N75/C", "X-Ops-Authorization-3"=>"SSW3xWmUzCxS+xKf1fspE5zMqikDh9gYSf1tOe9zguZKXVbdAZfc+MglX1N0", "X | |
-Ops-Authorization-4"=>"7i85UkkzbgwBhX4pU9MIsxOw8eccXYWBnKZ69yuJQJJBbmdUBXVyQTQ43PJS", "X-Ops-Authorization-5" | |
=>"CI/Lq+L21/tjlKE/nxBMLSqreHHgdosRv8MdpNWK5bgkIm1ozcZCi11gofBf", "X-Ops-Authorization-6"=>"fzD5OVjN6TPvePGgEY | |
I0GOtEqoea+PPXHrrfyGL2bQ=="} | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-b3bf8b34c97e21c5ee6aa0ddb11b133e | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-b3bf8b34c97e21c5ee6aa0ddb11b133e?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=map9KKI5wHL9jvqUiLeF0%2FIewUs%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1090nb | |
[Sat, 18 Feb 2012 17:04:12 +0000] INFO: Storing updated cookbooks/openssl/libraries/secure_password.rb in the | |
cache. | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/openssl/libraries | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:VAjgsLrtLLp+W+kfm3rgAkIUDQk= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:12Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:12Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"c3asB+cVXVkHRWN1jWMsw86 | |
twtv1v1USAO/gjS7bXDoHezhwS6du3ihS/7kv", "X-Ops-Authorization-2"=>"Wk9DLoOTvlc+Fl64YmUq803Us4THNQrQzF9+1PKD4cMV | |
eL5mu8ACfzV0onNZ", "X-Ops-Authorization-3"=>"9W0nb2pTcBcnjhXpTYw96OvJug/rz+PffgV1AUlCPBGCzNnGIWnKH1yb5RGZ", "X | |
-Ops-Authorization-4"=>"x4cC06md0xY9NO1URqc3Kbo9+N+Ekc1Ut1r4pnSeXAbmxU+Gf5cvmc2ofe6W", "X-Ops-Authorization-5" | |
=>"HHCLp1q/Y/fHdM5q1Ozj0zn0LwM2lgnKLbHvW8Kr6wjUkZ8+mQWINygBSoYu", "X-Ops-Authorization-6"=>"nySzDKyuaCjI6z0vj5 | |
nTtZytKdVu85Y+KWC6a0h+jw=="} | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-f111ba97dc5160e26eee6473dc8e86d5 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-f111ba97dc5160e26eee6473dc8e86d5?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=qzmQ6CGatqTiyMwp9ylb6EozJSE%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-m8ppdq | |
[Sat, 18 Feb 2012 17:04:12 +0000] INFO: Storing updated cookbooks/openssl/README.md in the cache. | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:fDcCo0dYv8FM1LNHj2JXWEhqHMM= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:12Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:12Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"Zcw4qBDVVYrRinnuW0+LBCc | |
l+eaChjmPDtrWPy1VyJTM2+tLkqvdwPyZCvP3", "X-Ops-Authorization-2"=>"v/r7XAMQnzDa/9F221YNIRYVGrtRGLgNwz4upzOeh1sE | |
NzPPOg2kbw+2hnxw", "X-Ops-Authorization-3"=>"1AnNIAYuLcT5WqFy99NW34l1OG8wmvEYF4SGIR7HLacfWzeRZTlEThLMjVnM", "X | |
-Ops-Authorization-4"=>"gJ9k2Mch/4/FUIqsjZplJo0PKL6vyZjnOFGup7HkR2tgaIdJ6ZEX85dTLEvF", "X-Ops-Authorization-5" | |
=>"LchxIfkL/Gl1pz7mqyiO5lDIM7pz5mROhUDg4+NhYOUMtRWO94smM79RbeE0", "X-Ops-Authorization-6"=>"etk+hDT2bxlrjRk6Na | |
BM/SXl1jtypMPJachx3ta3oQ=="} | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-aa56fc9900227fdc83b25654ee316593 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-aa56fc9900227fdc83b25654ee316593?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=AJDc7zGpUgfdi9n0YjZn4w6Borw%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1mtw7tc | |
[Sat, 18 Feb 2012 17:04:12 +0000] INFO: Storing updated cookbooks/openssl/metadata.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:WafA2OcYhpxRXANWdjDmK8jXEkY= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:12Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:12Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"KK+6mkbGZqFNZRJFboFfMHl | |
VR3XqGPqNy4WmgAxgmfTvQgQGEdH4tpmLRKOC", "X-Ops-Authorization-2"=>"fj+lUg5MhIWhE36mPA4IOsuVQ5y29UXAgHg3SwicB/zA | |
yajWAnFY65HJhkjk", "X-Ops-Authorization-3"=>"U27HgcQ97gxt/viq6GGRrBFkvTZc/U2h26dHir9zYLLlmjwH/MYdVApTPXzz", "X | |
-Ops-Authorization-4"=>"byWOIIb+HfPu12Atv9umHXXNLk6pJgyDnl64SANHh44nWx2pxGLEOTKPpjfJ", "X-Ops-Authorization-5" | |
=>"QpoLWLH10pojiQHSdSgWgGmp0c8NGX8NlM0IYfh8LtJUj1P36QuPF6vvnLOw", "X-Ops-Authorization-6"=>"Rc+suQMzo8Dbm/b76P | |
wXynjzLksss63qoFSQkm1TPQ=="} | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-952c568d3a52988f8610f62fcfc0397e | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-952c568d3a52988f8610f62fcfc0397e?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=CeOqhhVDZdVunUq6XtMdVM07p7M%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1xbbw1 | |
[Sat, 18 Feb 2012 17:04:12 +0000] INFO: Storing updated cookbooks/openssl/metadata.json in the cache. | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Synchronizing cookbook chef_handler | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:Xmf8Rri284X/9/ktzLTv/9wF4Kk= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:12Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:12Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"rbLYoMCXF1m/puDx55eQLDD | |
w2AuzTFj45wBTiSoXr4hAFD4Jl1ebIq/1tvXX", "X-Ops-Authorization-2"=>"MabC1E5+C8Wl/ONNfdpGBQ+iN6/NII410jVU4hxNhydn | |
0aJiN6/PDwUncS7z", "X-Ops-Authorization-3"=>"5YO57sGaufHknUoSzV+Zzha8ppXkwXcD5eSfJYz7Eru/zk8Wd/RvOyrnj1vC", "X | |
-Ops-Authorization-4"=>"bvQMsqtnLCws8oaEMQjE5CslQF1I61hhf9Yc7/FYNo2RFI5+QebjUePSnyxA", "X-Ops-Authorization-5" | |
=>"RgkdKvs2eXb7JlTF5jdVDGWPdde8QIqNlM4KrgN5RRJmpAtSi5MbaOEKejRN", "X-Ops-Authorization-6"=>"3o7ZL2qWxRmhhl+Ezl | |
5gbJsm68oazU+ItMm5w7a4qA=="} | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-64fd35146bb4042839800decca808b97 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-64fd35146bb4042839800decca808b97?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=uOT4JfToaKkO0%2BwRe0%2BV8OuRZLA%3D to tempfile C:/User | |
s/ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1glup30 | |
[Sat, 18 Feb 2012 17:04:12 +0000] INFO: Storing updated cookbooks/chef_handler/resources/default.rb in the cac | |
he. | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/chef_handler | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/chef_handler/resources | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:ZjFTv+d8zS1TFGS3UVpvdpQKMVs= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:12Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:12Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"XgEf7i34rjrgOhL1lOuuttD | |
lwnrQD7CXmIHJrRgUlrUJJaeQsf3X/s8Fx0hi", "X-Ops-Authorization-2"=>"WG2XACF5Rk2S8fodOayfanCFLF2q+9tadFIwr7Uvvpjj | |
cjmv+dB3iSSltgUn", "X-Ops-Authorization-3"=>"Y6ICY72E9PwJFrBeUBs2K1HltxeVc5xej9U2qysBPzbajKFZ272kUsvhH8W+", "X | |
-Ops-Authorization-4"=>"ec7dUo9haiUlaiWdFFYB3wXzd05FfnMEjaNPn5wS11RsJC6TScSY3pq5Bfey", "X-Ops-Authorization-5" | |
=>"AckDFgJIqhWwlLbtYbYkC2LUfiqyJF4rGadj7N79uMqxJmv9QYjb+STB3X9Z", "X-Ops-Authorization-6"=>"BSNAwnogtJ2TmpVPOY | |
tfikL6WVWwS9KhFXUpEVeuzQ=="} | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-1af403317a8ccf8a6c4f325bcc7e4e04 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-1af403317a8ccf8a6c4f325bcc7e4e04?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=pwUVF9kPSR9PuW0actRYuPgZJuY%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1kk1azu | |
[Sat, 18 Feb 2012 17:04:12 +0000] INFO: Storing updated cookbooks/chef_handler/providers/default.rb in the cac | |
he. | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/chef_handler/providers | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:tSHRz4wX3ZTfuKKP2+owEFJ2/mo= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:12Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:12Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"quYWG0ABD2HFFcOAzxKFQD8 | |
weV33CCfss5r9C4KSA+1QM9RP56ZFfLNUoSiB", "X-Ops-Authorization-2"=>"1urNLiRD45K9L3wER2SCx1RBIdgd9vpUBA0bLP+NLv4g | |
Fr0IzAT6XtNsFwtJ", "X-Ops-Authorization-3"=>"MgQUoj0T907V5FlzyHdgDmLZEaB2QZX+ut2W7I5emkygGg5G66dSq4Batv6X", "X | |
-Ops-Authorization-4"=>"5sJnlpf68rdRZ6xvhZpoHCCKGcEGrAem61q7ZwfQ+G3AklMdY/RuMKZxvWiV", "X-Ops-Authorization-5" | |
=>"4mDdqX+jQNX71rhFIVx8chiu5S0yPIOLy5AiXNmEvefIkkoL2m1PJno6OqCy", "X-Ops-Authorization-6"=>"ZIHWUH96PDfbwlIFqg | |
MbsStQ9ic5KbpQcvlL4aULvA=="} | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-b301b2d18594a1e9cc552e2e85a9be96 | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-b301b2d18594a1e9cc552e2e85a9be96?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=jpA%2FLCHxIA6klDnFJYd21LmKhJo%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-193xqfx | |
[Sat, 18 Feb 2012 17:04:13 +0000] INFO: Storing updated cookbooks/chef_handler/recipes/default.rb in the cache | |
. | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/chef_handler/recipes | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:fAD90L5dmuoNZl+DAEkYjIL+psk= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:13Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:13Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"U7Xzg02QVfqAnFWFpiEtADX | |
E129L2eWZWHrbc5SBBaaInF6ZtasWz5+v8lVD", "X-Ops-Authorization-2"=>"EcPWMI0vkPZaY9MlASXbIHLkm0RGcTiQervWw/pemNma | |
hZzIyOiFJi+t5HBb", "X-Ops-Authorization-3"=>"0zHTSbA+QQr2iJaY4Ui1BG/esWN0kvzaNGPVEwOxhwZDgrkCNxnxg1fNI7nV", "X | |
-Ops-Authorization-4"=>"+lQKNHYo/n01QxdCu3upoIhc3muce+PFcS6Hnmup56gRp0472WIXenfApzRm", "X-Ops-Authorization-5" | |
=>"vLF/OstQO+l7ANhJ9qWouewae5/Dm8hKMtaN0eyWyIWXx+oQSwCxQNxCwwnZ", "X-Ops-Authorization-6"=>"++UNffvIburUkVuXP7 | |
KXYjVj/kgcDIZW5Yq5ixoUfA=="} | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-db05ae653e0fedf3c9747fad170612df | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-db05ae653e0fedf3c9747fad170612df?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=JQ4CYRqGsnAXn3oYFl6y8zj%2B7Pc%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-6icwh3 | |
[Sat, 18 Feb 2012 17:04:13 +0000] INFO: Storing updated cookbooks/chef_handler/recipes/json_file.rb in the cac | |
he. | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:tf4bjBY7ycMnhwmxVYMrNsfASJI= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:13Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:13Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"hESKbViGG7ha/v4OAfgC6o8 | |
NYqpYE3BiX6n9qR9LV8tXDMecVi2UxMhLaWWC", "X-Ops-Authorization-2"=>"A8U1Eri+8u/O0jNLSPsGpS0gjGFQmXLmGmio+/bM84oy | |
xKUZqvt/c48topuG", "X-Ops-Authorization-3"=>"w68gT6M+XWooK34KodAV7rG0bHIII9BkfI1L7s/aPA+6B1ERXp7aKaPJDxjb", "X | |
-Ops-Authorization-4"=>"C3ZZwAeDLTayfQVlTTz+BCpzzIub2aOAwlzyinV8Oq9hQmEpyW1pc9/XBXya", "X-Ops-Authorization-5" | |
=>"dIZBP1VaN2CDy6aGGm+wRpeWN+CvOnlvE0sLJzBoPdk8ZBAKLb22aqKajO7o", "X-Ops-Authorization-6"=>"iWvO6GeAVPJokXcR7U | |
GSVJW9m0IJdYrUqSR6LYcgGQ=="} | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-710010283d3560b512263d52f8271aa3 | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-710010283d3560b512263d52f8271aa3?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=GXU8I9HXG9SE02Gm7T5nYg%2FYzjE%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1dqkncz | |
[Sat, 18 Feb 2012 17:04:13 +0000] INFO: Storing updated cookbooks/chef_handler/attributes/default.rb in the ca | |
che. | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/chef_handler/attributes | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:vkkiRzXrfSq68UhzmSjjvj7hO7o= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:13Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:13Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"yHEjqmuGRWRXCIsZez4HKdi | |
k9DgnHjM2PoY0PWB5qz997h/FXHTCKGAkbGbk", "X-Ops-Authorization-2"=>"Q4SdoWS2pwOvGjTfjIcqoC4EiWCu/dRI7wXzDDCmg2Lw | |
0veXEHQMvS3c0oIn", "X-Ops-Authorization-3"=>"EruOg7xiOsH3Yjo2FH/NaoAs7MjJrLzopAlmacLT5f/YaoC/RzHMbrkytLPQ", "X | |
-Ops-Authorization-4"=>"dOUtg+VWjafJSFgnw8zVr5t9WmpemZOcfxiEEwzmk3azMsww8VHhhAGZKpgD", "X-Ops-Authorization-5" | |
=>"Rk1F4bPU/79NFOA4eyHVNXJ4KH9zva7FOkvqrbXjCoy+pXnpU8mCY6DH4zPi", "X-Ops-Authorization-6"=>"UrbZMEK7BbT/FcDvAC | |
gxss/yOHvbRhIho/clj/bqXg=="} | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-e82549ca7a038fa004b8a06b12a13611 | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-e82549ca7a038fa004b8a06b12a13611?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=JE8tRgjz8LezYIB%2Fj%2FahFtZ3anI%3D to tempfile C:/User | |
s/ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1134utf | |
[Sat, 18 Feb 2012 17:04:13 +0000] INFO: Storing updated cookbooks/chef_handler/README.md in the cache. | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:92rljbXTWnw3f4ZvxdmwfNuHANc= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:13Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:13Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"GyFShYkH9EEERL9GXJthn0S | |
sRFUnJnybyczq4KIaPhpYDKJQLFw/bfh+h7Pl", "X-Ops-Authorization-2"=>"g9Ag/mOAbwvCz5pFqVesaEk7iWPWNtm+X9mK7qPzDIz1 | |
nBvoz/Ma/cJhlHcM", "X-Ops-Authorization-3"=>"rrmFtQg+Oilcswcjxm+rv20wR4HUvAAHPJn5sxl8TLvmxWkOScOHoaY89nkT", "X | |
-Ops-Authorization-4"=>"ATbJraEKHNDsLvvjr6hjpmOGVkj0MO0nJ3h+NXbtnZtg1GW/J7FOmNKOhCC5", "X-Ops-Authorization-5" | |
=>"M7II4stVRApKfXsCkKYl0YzsePvTvBA+aHozCE571n4sttRdxSHfqYFXUAA0", "X-Ops-Authorization-6"=>"kKSi6MOi1yk+TzGqEj | |
ctkorQCuV2sfTzysldWa2mrg=="} | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-26ee3eb9b3adceb6e46f344c6618a169 | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-26ee3eb9b3adceb6e46f344c6618a169?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=7f3JoCN3ezOPuoZ5U5QOUKExv%2FU%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1n8oao5 | |
[Sat, 18 Feb 2012 17:04:13 +0000] INFO: Storing updated cookbooks/chef_handler/metadata.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:xMi1mnLija/N1qyWnaBN/EUupkw= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:13Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:13Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"CGUDH7qcWKaK4vP0KAesPyg | |
Lci/H1C7IAlrp0/RPrm+zQUl8zkHJ0FuHsEk6", "X-Ops-Authorization-2"=>"hxPjV62iDpbsjdfI2XK/xPBrPbLylelHlylKHjgVNFnV | |
pfqqVTTLudL0L2/5", "X-Ops-Authorization-3"=>"HkczrTxnjVzg8ny8+5gNrvfT3qB4iq9GBTSt77YjCFRTSQqQ7uLQ8NyR3R5t", "X | |
-Ops-Authorization-4"=>"X431TmkkdCFkvU4NgqvsR205e3ca4XPbQb/7/JJs9kZD7gsrDo8iDwk6HnbS", "X-Ops-Authorization-5" | |
=>"N6hOeN13hRhRROl2Drka+63EjEiOZ6288a6eZCa8XaApdW1Nc/ZG2l8JvpzS", "X-Ops-Authorization-6"=>"rvwy3GNN0i+8gXrbj8 | |
GsmYo8J4Bmg9UrZd1HZlrb/A=="} | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-1abcd0bf107234191c48b4121002aab5 | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-1abcd0bf107234191c48b4121002aab5?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=2PvrKHR%2FudYDyoAz15QFK6RmsMw%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1sehjkz | |
[Sat, 18 Feb 2012 17:04:13 +0000] INFO: Storing updated cookbooks/chef_handler/metadata.json in the cache. | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Loading cookbook sql_server's library file: c:/chef/cache/cookbooks/s | |
ql_server/libraries/helper.rb | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Loading cookbook windows's library file: c:/chef/cache/cookbooks/wind | |
ows/libraries/feature_base.rb | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Loading cookbook windows's library file: c:/chef/cache/cookbooks/wind | |
ows/libraries/registry_helper.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's library file: c:/chef/cache/cookbooks/wind | |
ows/libraries/helper.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's library file: c:/chef/cache/cookbooks/wind | |
ows/libraries/windows_privileged.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's library file: c:/chef/cache/cookbooks/wind | |
ows/libraries/version.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's library file: c:/chef/cache/cookbooks/wind | |
ows/libraries/ruby_19_patches.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook openssl's library file: c:/chef/cache/cookbooks/open | |
ssl/libraries/secure_password.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's providers from c:/chef/cache/cookbooks/win | |
dows/providers/registry.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/providers/registry | |
.rb into a provider named windows_registry defined in Chef::Provider::WindowsRegistry | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's providers from c:/chef/cache/cookbooks/win | |
dows/providers/auto_run.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/providers/auto_run | |
.rb into a provider named windows_auto_run defined in Chef::Provider::WindowsAutoRun | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's providers from c:/chef/cache/cookbooks/win | |
dows/providers/path.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/providers/path.rb | |
into a provider named windows_path defined in Chef::Provider::WindowsPath | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's providers from c:/chef/cache/cookbooks/win | |
dows/providers/feature_servermanagercmd.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/providers/feature_ | |
servermanagercmd.rb into a provider named windows_feature_servermanagercmd defined in Chef::Provider::WindowsF | |
eatureServermanagercmd | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's providers from c:/chef/cache/cookbooks/win | |
dows/providers/zipfile.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/providers/zipfile. | |
rb into a provider named windows_zipfile defined in Chef::Provider::WindowsZipfile | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's providers from c:/chef/cache/cookbooks/win | |
dows/providers/package.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/providers/package. | |
rb into a provider named windows_package defined in Chef::Provider::WindowsPackage | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's providers from c:/chef/cache/cookbooks/win | |
dows/providers/batch.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/providers/batch.rb | |
into a provider named windows_batch defined in Chef::Provider::WindowsBatch | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's providers from c:/chef/cache/cookbooks/win | |
dows/providers/feature_dism.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/providers/feature_ | |
dism.rb into a provider named windows_feature_dism defined in Chef::Provider::WindowsFeatureDism | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's providers from c:/chef/cache/cookbooks/win | |
dows/providers/reboot.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/providers/reboot.r | |
b into a provider named windows_reboot defined in Chef::Provider::WindowsReboot | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook chef_handler's providers from c:/chef/cache/cookbook | |
s/chef_handler/providers/default.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/chef_handler/providers/def | |
ault.rb into a provider named chef_handler defined in Chef::Provider::ChefHandler | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's resources from c:/chef/cache/cookbooks/win | |
dows/resources/zipfile.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/resources/zipfile. | |
rb into a resource named windows_zipfile defined in Chef::Resource::WindowsZipfile | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's resources from c:/chef/cache/cookbooks/win | |
dows/resources/package.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/resources/package. | |
rb into a resource named windows_package defined in Chef::Resource::WindowsPackage | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's resources from c:/chef/cache/cookbooks/win | |
dows/resources/registry.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/resources/registry | |
.rb into a resource named windows_registry defined in Chef::Resource::WindowsRegistry | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's resources from c:/chef/cache/cookbooks/win | |
dows/resources/auto_run.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/resources/auto_run | |
.rb into a resource named windows_auto_run defined in Chef::Resource::WindowsAutoRun | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's resources from c:/chef/cache/cookbooks/win | |
dows/resources/reboot.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/resources/reboot.r | |
b into a resource named windows_reboot defined in Chef::Resource::WindowsReboot | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's resources from c:/chef/cache/cookbooks/win | |
dows/resources/path.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/resources/path.rb | |
into a resource named windows_path defined in Chef::Resource::WindowsPath | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's resources from c:/chef/cache/cookbooks/win | |
dows/resources/batch.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/resources/batch.rb | |
into a resource named windows_batch defined in Chef::Resource::WindowsBatch | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's resources from c:/chef/cache/cookbooks/win | |
dows/resources/feature.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/resources/feature. | |
rb into a resource named windows_feature defined in Chef::Resource::WindowsFeature | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook chef_handler's resources from c:/chef/cache/cookbook | |
s/chef_handler/resources/default.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/chef_handler/resources/def | |
ault.rb into a resource named chef_handler defined in Chef::Resource::ChefHandler | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Node ip-0A7A5A94 loading cookbook sql_server's attribute file c:/chef | |
/cache/cookbooks/sql_server/attributes/client.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Node ip-0A7A5A94 loading cookbook sql_server's attribute file c:/chef | |
/cache/cookbooks/sql_server/attributes/default.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Node ip-0A7A5A94 loading cookbook sql_server's attribute file c:/chef | |
/cache/cookbooks/sql_server/attributes/server.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Node ip-0A7A5A94 loading cookbook windows's attribute file c:/chef/ca | |
che/cookbooks/windows/attributes/default.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Node ip-0A7A5A94 loading cookbook chef_handler's attribute file c:/ch | |
ef/cache/cookbooks/chef_handler/attributes/default.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading Recipe openssl via include_recipe | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Found recipe default in cookbook openssl | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading Recipe windows via include_recipe | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Found recipe default in cookbook windows | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading Recipe sql_server::server via include_recipe | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Found recipe server in cookbook sql_server | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: String to sign: 'Method:PUT | |
Hashed Path:XPKIyzaDmGFyGStenynpzDhBAzI= | |
X-Ops-Content-Hash:5oEH5aIuJoc4vKcGAl+RdoRXHiI= | |
X-Ops-Timestamp:2012-02-18T17:04:14Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:14Z", "X-Ops-Content-Hash"=>"5oEH5aIuJoc4vKcGAl+RdoRXHiI=", "X-Ops-Authorization-1"=>"agMlra/rIXAShN6Zbj+nCUz | |
xkDgx7YWKVkynQ1ElEmT7Ztc0DY0NE4y9lZo3", "X-Ops-Authorization-2"=>"2tqCN2WL4Y47a9nqdb/IKomwPUpYaUzzHazkbmy0fa0u | |
Nf1Jib+Y6SgrVcJJ", "X-Ops-Authorization-3"=>"u747LdD2WDlUlm2Elcksdj/1zMXZqAIpfCnC/Q8D47LKw9MceYBqWZm2xj0T", "X | |
-Ops-Authorization-4"=>"XxjiCaI2FEP/os0JKBQih5bxBumHEgVbdJZ7DHHpd7s2L7iJbX4TaNr+4HOq", "X-Ops-Authorization-5" | |
=>"FgtsAiXHq2rCtvxD+nmUauZZPo6PUJ9mnkcYIAT6PyHgIaHHuvQOJrFHH1AJ", "X-Ops-Authorization-6"=>"BXopOYDza4EtaY9kqc | |
+qLUSKDENTi3P+j7cmqR4VIg=="} | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Sending HTTP Request via PUT to api.opscode.com:443/organizations/bra | |
ttyredhead/nodes/ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Setting gem_package[win32-service] to the state of the prior gem_pack | |
age[win32-service] | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Loading Recipe sql_server::client via include_recipe | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Found recipe client in cookbook sql_server | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Converging node ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Processing gem_package[win32-api] on ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:15 +0000] INFO: Processing gem_package[win32-api] action install (windows::default lin | |
e /chef/cache/cookbooks/windows/recipes/default.rb) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: gem_package[win32-api] found installed gem win32-api version 1.4.8 ma | |
tching win32-api (>= 0) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: gem_package[win32-api] is already installed - nothing to do | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Processing gem_package[win32-service] on ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:15 +0000] INFO: Processing gem_package[win32-service] action install (windows::default | |
line /chef/cache/cookbooks/windows/recipes/default.rb) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: gem_package[win32-service] found installed gem win32-service version | |
0.7.2 matching win32-service (>= 0) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: gem_package[win32-service] is already installed - nothing to do | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Processing gem_package[windows-api] on ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:15 +0000] INFO: Processing gem_package[windows-api] action install (windows::default l | |
ine /chef/cache/cookbooks/windows/recipes/default.rb) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: gem_package[windows-api] found installed gem windows-api version 0.4. | |
0 matching windows-api (>= 0) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: gem_package[windows-api] is already installed - nothing to do | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Processing gem_package[windows-pr] on ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:15 +0000] INFO: Processing gem_package[windows-pr] action install (windows::default li | |
ne /chef/cache/cookbooks/windows/recipes/default.rb) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: gem_package[windows-pr] found installed gem windows-pr version 1.2.1 | |
matching windows-pr (>= 0) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: gem_package[windows-pr] is already installed - nothing to do | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Processing gem_package[win32-dir] on ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:15 +0000] INFO: Processing gem_package[win32-dir] action install (windows::default lin | |
e /chef/cache/cookbooks/windows/recipes/default.rb) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: gem_package[win32-dir] found installed gem win32-dir version 0.3.7 ma | |
tching win32-dir (>= 0) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: gem_package[win32-dir] is already installed - nothing to do | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Processing gem_package[win32-event] on ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:15 +0000] INFO: Processing gem_package[win32-event] action install (windows::default l | |
ine /chef/cache/cookbooks/windows/recipes/default.rb) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: gem_package[win32-event] found installed gem win32-event version 0.5. | |
2 matching win32-event (>= 0) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: gem_package[win32-event] is already installed - nothing to do | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Processing gem_package[win32-mutex] on ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:15 +0000] INFO: Processing gem_package[win32-mutex] action install (windows::default l | |
ine /chef/cache/cookbooks/windows/recipes/default.rb) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: gem_package[win32-mutex] found installed gem win32-mutex version 0.3. | |
1 matching win32-mutex (>= 0) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: gem_package[win32-mutex] is already installed - nothing to do | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Processing template[c:\chef\cache\ConfigurationFile.ini] on ip-0A7A5A | |
94 | |
[Sat, 18 Feb 2012 17:04:15 +0000] INFO: Processing template[c:\chef\cache\ConfigurationFile.ini] action create | |
(sql_server::server line /chef/cache/cookbooks/sql_server/recipes/server.rb) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:mj4LGlsgJ4QaeQR91aF9QFFwRiI= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:15Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:15Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"GF6iZ+sfJA8wKi1GqfRllRC | |
i6Z4Sr27zafqbAlGAQiQhvtY/te0Up/9tofIP", "X-Ops-Authorization-2"=>"CUNmHQAYGWI2uGV/okXkO3iITKIayHhHGvpSAdskD3aD | |
4V5SVmKc6SgiVyDp", "X-Ops-Authorization-3"=>"uNn74SgZdSa4qPg1RB+qsRs8D+hj3uNwCU+ilu07dR/aI/sGQ8SQMyM7DFTN", "X | |
-Ops-Authorization-4"=>"/N5Rb1TsHjuEZskJEDmaO5/EKmvXmTOIA8WwzS6EKNAQMm0/Tzvl1EnY50ks", "X-Ops-Authorization-5" | |
=>"JTHYinkKZ2nGGz3/aHP6yuJgGg/kIFFfNmxGmqwgGZSzSSR3fWsFRHBbBrgf", "X-Ops-Authorization-6"=>"7v5ej42hVTzar14R4x | |
ZdtPU/kPQv2VkBZe8gH8jWTg=="} | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-49d6eb820a2e2ca8069c834326d04aac | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-49d6eb820a2e2ca8069c834326d04aac?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=1wHxEeNrVXtltRARhCERf5i%2BWLU%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1jzne4k | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Storing updated cookbooks/sql_server/templates/default/ConfigurationF | |
ile.ini.erb in the cache. | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/sql_server/templates | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/sql_server/templates/defau | |
lt | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Current content's checksum: | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Rendered content's checksum: 43d61d77f6eff56ab666430d2c42f0b36d01804c | |
fef17ceac9b8519500571498 | |
[Sat, 18 Feb 2012 17:04:15 +0000] INFO: template[c:/chef/cache/ConfigurationFile.ini] updated content | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Processing windows_package[Microsoft SQL Server 2008 R2 (32-bit)] on | |
ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:15 +0000] INFO: Processing windows_package[Microsoft SQL Server 2008 R2 (32-bit)] acti | |
on install (sql_server::server line /chef/cache/cookbooks/sql_server/recipes/server.rb) | |
[Sat, 18 Feb 2012 17:04:15 +0000] INFO: Installing windows_package[Microsoft SQL Server 2008 R2 (32-bit)] vers | |
ion latest | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Processing windows_package[Microsoft SQL Server 2008 R2 (32-bit)] as | |
a custom installer. | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Caching a copy of file http://care.dlservice.microsoft.com/dl/downloa | |
d/5/1/A/51A153F6-6B08-4F94-A7B2-BA1AD482BC75/SQLEXPR32_x86_ENU.exe at c:/chef/cache/SQLEXPR32_x86_ENU.exe | |
[Sat, 18 Feb 2012 17:04:15 +0000] INFO: Processing remote_file[c:/chef/cache/SQLEXPR32_x86_ENU.exe] action cre | |
ate (dynamically defined) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: remote_file[c:/chef/cache/SQLEXPR32_x86_ENU.exe] checking for changes | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Sending HTTP Request via GET to care.dlservice.microsoft.com:80/dl/do | |
wnload/5/1/A/51A153F6-6B08-4F94-A7B2-BA1AD482BC75/SQLEXPR32_x86_ENU.exe | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Streaming download from http://care.dlservice.microsoft.com/dl/downlo | |
ad/5/1/A/51A153F6-6B08-4F94-A7B2-BA1AD482BC75/SQLEXPR32_x86_ENU.exe to tempfile C:/Users/ADMINI~1/AppData/Loca | |
l/Temp/2/chef-rest20120218-3744-1q8sb61 | |
[Sat, 18 Feb 2012 17:04:38 +0000] DEBUG: remote_file[c:/chef/cache/SQLEXPR32_x86_ENU.exe] checking for file ex | |
istence of c:/chef/cache/SQLEXPR32_x86_ENU.exe | |
[Sat, 18 Feb 2012 17:04:38 +0000] DEBUG: remote_file[c:/chef/cache/SQLEXPR32_x86_ENU.exe] creating c:/chef/cac | |
he/SQLEXPR32_x86_ENU.exe | |
[Sat, 18 Feb 2012 17:04:39 +0000] INFO: remote_file[c:/chef/cache/SQLEXPR32_x86_ENU.exe] updated | |
[Sat, 18 Feb 2012 17:04:39 +0000] INFO: remote_file[c:/chef/cache/SQLEXPR32_x86_ENU.exe] mode changed to 755 | |
[Sat, 18 Feb 2012 17:04:39 +0000] INFO: Starting installation...this could take awhile. | |
[Sat, 18 Feb 2012 17:04:39 +0000] DEBUG: sh(start /wait c:\chef\cache\SQLEXPR32_x86_ENU.exe /q /ConfigurationF | |
ile=c:\chef\cache\ConfigurationFile.ini) | |
[Sat, 18 Feb 2012 17:08:30 +0000] DEBUG: Processing gem_package[win32-service] on ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:08:30 +0000] INFO: Processing gem_package[win32-service] action install (sql_server::serv | |
er line /chef/cache/cookbooks/sql_server/recipes/server.rb) | |
[Sat, 18 Feb 2012 17:08:30 +0000] DEBUG: gem_package[win32-service] found installed gem win32-service version | |
0.7.2 matching win32-service (>= 0) | |
[Sat, 18 Feb 2012 17:08:30 +0000] DEBUG: gem_package[win32-service] is already installed - nothing to do | |
[Sat, 18 Feb 2012 17:08:30 +0000] DEBUG: Processing template[C:\Program Files\Microsoft SQL Server/restart.rb] | |
on ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:08:30 +0000] INFO: Processing template[C:\Program Files\Microsoft SQL Server/restart.rb] | |
action create (sql_server::server line /chef/cache/cookbooks/sql_server/recipes/server.rb) | |
[Sat, 18 Feb 2012 17:08:30 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:08:30 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:1mB1GeD37EqS1X274jgdtQrjA2c= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:08:30Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:08 | |
:30Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"eJxks3m/NGTI7itebMrg5P+ | |
kF/PPzomSjTCYRti8Jf2ObWzYYr4UA3wnlbb1", "X-Ops-Authorization-2"=>"HYY7Elos32Rdyuw/ZKwqxHr6DaDLXOERLVrndmF4z3ri | |
ZO93ESw8czsxEkxN", "X-Ops-Authorization-3"=>"8PUnVpLdHxE7HYR8tf6CCU78HAoYdULXHvY7twYN1MBJr2FWwcKpO0CTUr+z", "X | |
-Ops-Authorization-4"=>"H6mkx1cezhg5dnePK14k2Vksf1ftyb2YAor2jORHSg9qPQT39tJ28RTkUZcU", "X-Ops-Authorization-5" | |
=>"egsV54rSWBTSDe9fs1dIalIEvgXTKQIdRNDkB6Y+hZBcb1pxM8RRXkonw73x", "X-Ops-Authorization-6"=>"O3Lnz75pMXhVrBuwMf | |
VBKUu3SQ4MWsERHBoJHCrivQ=="} | |
[Sat, 18 Feb 2012 17:08:30 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-48df9f4d2475994d70b79f24d695c7f4 | |
[Sat, 18 Feb 2012 17:08:30 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-48df9f4d2475994d70b79f24d695c7f4?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=DDSK9ApXBd1fuuyoqylQXuNaNm4%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-o8ai96 | |
[Sat, 18 Feb 2012 17:08:30 +0000] DEBUG: Storing updated cookbooks/sql_server/templates/default/restart.rb.erb | |
in the cache. | |
[Sat, 18 Feb 2012 17:08:30 +0000] DEBUG: Current content's checksum: | |
[Sat, 18 Feb 2012 17:08:30 +0000] DEBUG: Rendered content's checksum: b792f32148f7828a923e8a01e9fba12a56e73f0c | |
a52fb59cfd2ba671ad0e533a | |
[Sat, 18 Feb 2012 17:08:30 +0000] INFO: template[C:/Program Files/Microsoft SQL Server/restart.rb] updated con | |
tent | |
[Sat, 18 Feb 2012 17:08:30 +0000] DEBUG: Processing service[MSSQL$SQLEXPRESS] on ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:08:30 +0000] INFO: Processing service[MSSQL$SQLEXPRESS] action nothing (sql_server::serve | |
r line /chef/cache/cookbooks/sql_server/recipes/server.rb) | |
[Sat, 18 Feb 2012 17:08:30 +0000] ERROR: service[MSSQL$SQLEXPRESS] (sql_server::server line /chef/cache/cookbo | |
oks/sql_server/recipes/server.rb) has had an error | |
[Sat, 18 Feb 2012 17:08:30 +0000] ERROR: service[MSSQL$SQLEXPRESS] (c:/chef/cache/cookbooks/sql_server/recipes | |
/server.rb:61:in `from_file') had an error: | |
service[MSSQL$SQLEXPRESS] (sql_server::server line /chef/cache/cookbooks/sql_server/recipes/server.rb) had an | |
error: Win32::Service::Error: The specified service does not exist as an installed service. | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/win32-service-0.7.2/lib/win32/service.rb:962:in `status' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/provider/service/windows.rb:133:in `cur | |
rent_state' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/provider/service/windows.rb:35:in `load | |
_current_resource' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource.rb:439:in `run_action' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/runner.rb:45:in `run_action' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/runner.rb:81:in `block (2 levels) in co | |
nverge' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/runner.rb:81:in `each' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/runner.rb:81:in `block in converge' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection.rb:94:in `block in | |
execute_each_resource' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection/stepable_iterator.r | |
b:116:in `call' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection/stepable_iterator.r | |
b:116:in `call_iterator_block' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection/stepable_iterator.r | |
b:85:in `step' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection/stepable_iterator.r | |
b:104:in `iterate' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection/stepable_iterator.r | |
b:55:in `each_with_index' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection.rb:92:in `execute_e | |
ach_resource' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/runner.rb:76:in `converge' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/client.rb:312:in `converge' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/client.rb:160:in `run' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:239:in `block in | |
run_application' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:229:in `loop' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:229:in `run_appli | |
cation' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application.rb:67:in `run' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/bin/chef-client:26:in `<top (required)>' | |
C:/opscode/chef/bin/chef-client:19:in `load' | |
C:/opscode/chef/bin/chef-client:19:in `<main>' | |
[Sat, 18 Feb 2012 17:08:30 +0000] ERROR: Running exception handlers | |
[Sat, 18 Feb 2012 17:08:30 +0000] FATAL: Saving node information to c:/chef/cache/failed-run-data.json | |
[Sat, 18 Feb 2012 17:08:30 +0000] ERROR: Exception handlers complete | |
[Sat, 18 Feb 2012 17:08:30 +0000] DEBUG: Re-raising exception: Win32::Service::Error - service[MSSQL$SQLEXPRES | |
S] (sql_server::server line /chef/cache/cookbooks/sql_server/recipes/server.rb) had an error: Win32::Service:: | |
Error: The specified service does not exist as an installed service. | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/win32-service-0.7.2/lib/win32/service.rb:962:in `status' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/provider/service/windows.rb:133:in `c | |
urrent_state' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/provider/service/windows.rb:35:in `lo | |
ad_current_resource' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource.rb:439:in `run_action' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/runner.rb:45:in `run_action' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/runner.rb:81:in `block (2 levels) in | |
converge' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/runner.rb:81:in `each' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/runner.rb:81:in `block in converge' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection.rb:94:in `block i | |
n execute_each_resource' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection/stepable_iterator | |
.rb:116:in `call' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection/stepable_iterator | |
.rb:116:in `call_iterator_block' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection/stepable_iterator | |
.rb:85:in `step' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection/stepable_iterator | |
.rb:104:in `iterate' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection/stepable_iterator | |
.rb:55:in `each_with_index' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection.rb:92:in `execute | |
_each_resource' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/runner.rb:76:in `converge' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/client.rb:312:in `converge' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/client.rb:160:in `run' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:239:in `block i | |
n run_application' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:229:in `loop' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:229:in `run_app | |
lication' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application.rb:67:in `run' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/bin/chef-client:26:in `<top (required)>' | |
C:/opscode/chef/bin/chef-client:19:in `load' | |
C:/opscode/chef/bin/chef-client:19:in `<main>' | |
[Sat, 18 Feb 2012 17:08:30 +0000] FATAL: Stacktrace dumped to c:/chef/cache/chef-stacktrace.out | |
[Sat, 18 Feb 2012 17:08:30 +0000] DEBUG: Win32::Service::Error: service[MSSQL$SQLEXPRESS] (sql_server::server | |
line /chef/cache/cookbooks/sql_server/recipes/server.rb) had an error: Win32::Service::Error: The specified se | |
rvice does not exist as an installed service. | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/win32-service-0.7.2/lib/win32/service.rb:962:in `status' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/provider/service/windows.rb:133:in `cur | |
rent_state' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/provider/service/windows.rb:35:in `load | |
_current_resource' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource.rb:439:in `run_action' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/runner.rb:45:in `run_action' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/runner.rb:81:in `block (2 levels) in co | |
nverge' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/runner.rb:81:in `each' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/runner.rb:81:in `block in converge' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection.rb:94:in `block in | |
execute_each_resource' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection/stepable_iterator.r | |
b:116:in `call' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection/stepable_iterator.r | |
b:116:in `call_iterator_block' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection/stepable_iterator.r | |
b:85:in `step' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection/stepable_iterator.r | |
b:104:in `iterate' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection/stepable_iterator.r | |
b:55:in `each_with_index' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection.rb:92:in `execute_e | |
ach_resource' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/runner.rb:76:in `converge' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/client.rb:312:in `converge' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/client.rb:160:in `run' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:239:in `block in | |
run_application' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:229:in `loop' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:229:in `run_appli | |
cation' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application.rb:67:in `run' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/bin/chef-client:26:in `<top (required)>' | |
C:/opscode/chef/bin/chef-client:19:in `load' | |
C:/opscode/chef/bin/chef-client:19:in `<main>' | |
[Sat, 18 Feb 2[Sat, 18 Feb 2012 17:03:33 +0000] INFO: *** Chef 0.10.8 *** | |
[Sat, 18 Feb 2012 17:03:33 +0000] DEBUG: Loading plugin os | |
[Sat, 18 Feb 2012 17:03:33 +0000] DEBUG: Loading plugin kernel | |
[Sat, 18 Feb 2012 17:03:33 +0000] DEBUG: Loading plugin ruby | |
[Sat, 18 Feb 2012 17:03:33 +0000] DEBUG: Loading plugin languages | |
[Sat, 18 Feb 2012 17:03:34 +0000] DEBUG: ---- Begin ruby -e "require 'rbconfig'; puts %Q(platform=#{RUBY_PLATF | |
ORM},version=#{RUBY_VERSION},release_date=#{RUBY_RELEASE_DATE},target=#{::Config::CONFIG['target']},target_cpu | |
=#{::Config::CONFIG['target_cpu']},target_vendor=#{::Config::CONFIG['target_vendor']},target_os=#{::Config::CO | |
NFIG['target_os']},host=#{::Config::CONFIG['host']},host_cpu=#{::Config::CONFIG['host_cpu']},host_os=#{::Confi | |
g::CONFIG['host_os']},host_vendor=#{::Config::CONFIG['host_vendor']},bin_dir=#{::Config::CONFIG['bindir']},rub | |
y_bin=#{::File.join(::Config::CONFIG['bindir'], ::Config::CONFIG['ruby_install_name'])},)" STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:34 +0000] DEBUG: platform=i386-mingw32,version=1.9.2,release_date=2011-07-09,target=i3 | |
86-pc-mingw32,target_cpu=i386,target_vendor=pc,target_os=mingw32,host=i686-pc-mingw32,host_cpu=i686,host_os=mi | |
ngw32,host_vendor=pc,bin_dir=C:/opscode/chef/embedded/bin,ruby_bin=C:/opscode/chef/embedded/bin/ruby, | |
[Sat, 18 Feb 2012 17:03:34 +0000] DEBUG: ---- End ruby -e "require 'rbconfig'; puts %Q(platform=#{RUBY_PLATFOR | |
M},version=#{RUBY_VERSION},release_date=#{RUBY_RELEASE_DATE},target=#{::Config::CONFIG['target']},target_cpu=# | |
{::Config::CONFIG['target_cpu']},target_vendor=#{::Config::CONFIG['target_vendor']},target_os=#{::Config::CONF | |
IG['target_os']},host=#{::Config::CONFIG['host']},host_cpu=#{::Config::CONFIG['host_cpu']},host_os=#{::Config: | |
:CONFIG['host_os']},host_vendor=#{::Config::CONFIG['host_vendor']},bin_dir=#{::Config::CONFIG['bindir']},ruby_ | |
bin=#{::File.join(::Config::CONFIG['bindir'], ::Config::CONFIG['ruby_install_name'])},)" STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:34 +0000] DEBUG: ---- Begin ruby -e "require 'rbconfig'; puts %Q(platform=#{RUBY_PLATF | |
ORM},version=#{RUBY_VERSION},release_date=#{RUBY_RELEASE_DATE},target=#{::Config::CONFIG['target']},target_cpu | |
=#{::Config::CONFIG['target_cpu']},target_vendor=#{::Config::CONFIG['target_vendor']},target_os=#{::Config::CO | |
NFIG['target_os']},host=#{::Config::CONFIG['host']},host_cpu=#{::Config::CONFIG['host_cpu']},host_os=#{::Confi | |
g::CONFIG['host_os']},host_vendor=#{::Config::CONFIG['host_vendor']},bin_dir=#{::Config::CONFIG['bindir']},rub | |
y_bin=#{::File.join(::Config::CONFIG['bindir'], ::Config::CONFIG['ruby_install_name'])},)" STDERR ---- | |
[Sat, 18 Feb 2012 17:03:34 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:34 +0000] DEBUG: ---- End ruby -e "require 'rbconfig'; puts %Q(platform=#{RUBY_PLATFOR | |
M},version=#{RUBY_VERSION},release_date=#{RUBY_RELEASE_DATE},target=#{::Config::CONFIG['target']},target_cpu=# | |
{::Config::CONFIG['target_cpu']},target_vendor=#{::Config::CONFIG['target_vendor']},target_os=#{::Config::CONF | |
IG['target_os']},host=#{::Config::CONFIG['host']},host_cpu=#{::Config::CONFIG['host_cpu']},host_os=#{::Config: | |
:CONFIG['host_os']},host_vendor=#{::Config::CONFIG['host_vendor']},bin_dir=#{::Config::CONFIG['bindir']},ruby_ | |
bin=#{::File.join(::Config::CONFIG['bindir'], ::Config::CONFIG['ruby_install_name'])},)" STDERR ---- | |
[Sat, 18 Feb 2012 17:03:34 +0000] DEBUG: Ran (ruby -e "require 'rbconfig'; puts %Q(platform=#{RUBY_PLATFORM}, | |
version=#{RUBY_VERSION},release_date=#{RUBY_RELEASE_DATE},target=#{::Config::CONFIG['target']},target_cpu=#{:: | |
Config::CONFIG['target_cpu']},target_vendor=#{::Config::CONFIG['target_vendor']},target_os=#{::Config::CONFIG[ | |
'target_os']},host=#{::Config::CONFIG['host']},host_cpu=#{::Config::CONFIG['host_cpu']},host_os=#{::Config::CO | |
NFIG['host_os']},host_vendor=#{::Config::CONFIG['host_vendor']},bin_dir=#{::Config::CONFIG['bindir']},ruby_bin | |
=#{::File.join(::Config::CONFIG['bindir'], ::Config::CONFIG['ruby_install_name'])},)") returned 0 | |
[Sat, 18 Feb 2012 17:03:35 +0000] DEBUG: ---- Begin ruby -e "require 'rbconfig'; require 'rubygems'; puts ::Ge | |
m.default_exec_format % 'gem'" STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:35 +0000] DEBUG: gem | |
[Sat, 18 Feb 2012 17:03:35 +0000] DEBUG: ---- End ruby -e "require 'rbconfig'; require 'rubygems'; puts ::Gem. | |
default_exec_format % 'gem'" STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:35 +0000] DEBUG: ---- Begin ruby -e "require 'rbconfig'; require 'rubygems'; puts ::Ge | |
m.default_exec_format % 'gem'" STDERR ---- | |
[Sat, 18 Feb 2012 17:03:35 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:35 +0000] DEBUG: ---- End ruby -e "require 'rbconfig'; require 'rubygems'; puts ::Gem. | |
default_exec_format % 'gem'" STDERR ---- | |
[Sat, 18 Feb 2012 17:03:35 +0000] DEBUG: Ran (ruby -e "require 'rbconfig'; require 'rubygems'; puts ::Gem.def | |
ault_exec_format % 'gem'") returned 0 | |
[Sat, 18 Feb 2012 17:03:38 +0000] DEBUG: ---- Begin ruby -e "require 'rbconfig'; puts %x{C:/opscode/chef/embed | |
ded/bin/ruby C:/opscode/chef/embedded/bin/gem env gemdir}.chomp!" STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:38 +0000] DEBUG: C:/opscode/chef/embedded/lib/ruby/gems/1.9.1 | |
[Sat, 18 Feb 2012 17:03:38 +0000] DEBUG: ---- End ruby -e "require 'rbconfig'; puts %x{C:/opscode/chef/embedde | |
d/bin/ruby C:/opscode/chef/embedded/bin/gem env gemdir}.chomp!" STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:38 +0000] DEBUG: ---- Begin ruby -e "require 'rbconfig'; puts %x{C:/opscode/chef/embed | |
ded/bin/ruby C:/opscode/chef/embedded/bin/gem env gemdir}.chomp!" STDERR ---- | |
[Sat, 18 Feb 2012 17:03:38 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:38 +0000] DEBUG: ---- End ruby -e "require 'rbconfig'; puts %x{C:/opscode/chef/embedde | |
d/bin/ruby C:/opscode/chef/embedded/bin/gem env gemdir}.chomp!" STDERR ---- | |
[Sat, 18 Feb 2012 17:03:38 +0000] DEBUG: Ran (ruby -e "require 'rbconfig'; puts %x{C:/opscode/chef/embedded/b | |
in/ruby C:/opscode/chef/embedded/bin/gem env gemdir}.chomp!") returned 0 | |
[Sat, 18 Feb 2012 17:03:38 +0000] DEBUG: Loading plugin windows::kernel | |
[Sat, 18 Feb 2012 17:03:43 +0000] DEBUG: Loading plugin c | |
[Sat, 18 Feb 2012 17:03:43 +0000] DEBUG: Failed to run: gcc -v, assuming command not found | |
[Sat, 18 Feb 2012 17:03:43 +0000] DEBUG: ---- Begin gcc -v STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:43 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:43 +0000] DEBUG: ---- End gcc -v STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:43 +0000] DEBUG: ---- Begin gcc -v STDERR ---- | |
[Sat, 18 Feb 2012 17:03:43 +0000] DEBUG: Failed to run: gcc -v, assuming command not found | |
[Sat, 18 Feb 2012 17:03:43 +0000] DEBUG: ---- End gcc -v STDERR ---- | |
[Sat, 18 Feb 2012 17:03:43 +0000] DEBUG: Ran (gcc -v) returned 42 | |
[Sat, 18 Feb 2012 17:03:44 +0000] DEBUG: Failed to run: /lib/libc.so.6, assuming command not found | |
[Sat, 18 Feb 2012 17:03:44 +0000] DEBUG: ---- Begin /lib/libc.so.6 STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:44 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:44 +0000] DEBUG: ---- End /lib/libc.so.6 STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:44 +0000] DEBUG: ---- Begin /lib/libc.so.6 STDERR ---- | |
[Sat, 18 Feb 2012 17:03:44 +0000] DEBUG: Failed to run: /lib/libc.so.6, assuming command not found | |
[Sat, 18 Feb 2012 17:03:44 +0000] DEBUG: ---- End /lib/libc.so.6 STDERR ---- | |
[Sat, 18 Feb 2012 17:03:44 +0000] DEBUG: Ran (/lib/libc.so.6) returned 42 | |
[Sat, 18 Feb 2012 17:03:45 +0000] DEBUG: Failed to run: /lib64/libc.so.6, assuming command not found | |
[Sat, 18 Feb 2012 17:03:45 +0000] DEBUG: ---- Begin /lib64/libc.so.6 STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:45 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:45 +0000] DEBUG: ---- End /lib64/libc.so.6 STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:45 +0000] DEBUG: ---- Begin /lib64/libc.so.6 STDERR ---- | |
[Sat, 18 Feb 2012 17:03:45 +0000] DEBUG: Failed to run: /lib64/libc.so.6, assuming command not found | |
[Sat, 18 Feb 2012 17:03:45 +0000] DEBUG: ---- End /lib64/libc.so.6 STDERR ---- | |
[Sat, 18 Feb 2012 17:03:45 +0000] DEBUG: Ran (/lib64/libc.so.6) returned 42 | |
[Sat, 18 Feb 2012 17:03:46 +0000] DEBUG: Failed to run: cl /?, assuming command not found | |
[Sat, 18 Feb 2012 17:03:46 +0000] DEBUG: ---- Begin cl /? STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:46 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:46 +0000] DEBUG: ---- End cl /? STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:46 +0000] DEBUG: ---- Begin cl /? STDERR ---- | |
[Sat, 18 Feb 2012 17:03:46 +0000] DEBUG: Failed to run: cl /?, assuming command not found | |
[Sat, 18 Feb 2012 17:03:46 +0000] DEBUG: ---- End cl /? STDERR ---- | |
[Sat, 18 Feb 2012 17:03:46 +0000] DEBUG: Ran (cl /?) returned 42 | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: Failed to run: devenv.com /?, assuming command not found | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: ---- Begin devenv.com /? STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: ---- End devenv.com /? STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: ---- Begin devenv.com /? STDERR ---- | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: Failed to run: devenv.com /?, assuming command not found | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: ---- End devenv.com /? STDERR ---- | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: Ran (devenv.com /?) returned 42 | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: Failed to run: xlc -qversion, assuming command not found | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: ---- Begin xlc -qversion STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: ---- End xlc -qversion STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: ---- Begin xlc -qversion STDERR ---- | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: Failed to run: xlc -qversion, assuming command not found | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: ---- End xlc -qversion STDERR ---- | |
[Sat, 18 Feb 2012 17:03:47 +0000] DEBUG: Ran (xlc -qversion) returned 42 | |
[Sat, 18 Feb 2012 17:03:48 +0000] DEBUG: Failed to run: cc -V -flags, assuming command not found | |
[Sat, 18 Feb 2012 17:03:48 +0000] DEBUG: ---- Begin cc -V -flags STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:48 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:48 +0000] DEBUG: ---- End cc -V -flags STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:48 +0000] DEBUG: ---- Begin cc -V -flags STDERR ---- | |
[Sat, 18 Feb 2012 17:03:48 +0000] DEBUG: Failed to run: cc -V -flags, assuming command not found | |
[Sat, 18 Feb 2012 17:03:48 +0000] DEBUG: ---- End cc -V -flags STDERR ---- | |
[Sat, 18 Feb 2012 17:03:48 +0000] DEBUG: Ran (cc -V -flags) returned 42 | |
[Sat, 18 Feb 2012 17:03:49 +0000] DEBUG: Failed to run: what /opt/ansic/bin/cc, assuming command not found | |
[Sat, 18 Feb 2012 17:03:49 +0000] DEBUG: ---- Begin what /opt/ansic/bin/cc STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:49 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:49 +0000] DEBUG: ---- End what /opt/ansic/bin/cc STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:49 +0000] DEBUG: ---- Begin what /opt/ansic/bin/cc STDERR ---- | |
[Sat, 18 Feb 2012 17:03:49 +0000] DEBUG: Failed to run: what /opt/ansic/bin/cc, assuming command not found | |
[Sat, 18 Feb 2012 17:03:49 +0000] DEBUG: ---- End what /opt/ansic/bin/cc STDERR ---- | |
[Sat, 18 Feb 2012 17:03:49 +0000] DEBUG: Ran (what /opt/ansic/bin/cc) returned 42 | |
[Sat, 18 Feb 2012 17:03:49 +0000] DEBUG: Loading plugin chef | |
[Sat, 18 Feb 2012 17:03:49 +0000] DEBUG: Loading plugin cloud | |
[Sat, 18 Feb 2012 17:03:49 +0000] DEBUG: Loading plugin ec2 | |
[Sat, 18 Feb 2012 17:03:49 +0000] DEBUG: Loading plugin hostname | |
[Sat, 18 Feb 2012 17:03:49 +0000] DEBUG: Loading plugin windows::hostname | |
[Sat, 18 Feb 2012 17:03:49 +0000] DEBUG: Loading plugin network | |
[Sat, 18 Feb 2012 17:03:49 +0000] DEBUG: Loading plugin windows::network | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: ---- Begin arp -a STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: Interface: 10.122.90.148 --- 0xb | |
Internet Address Physical Address Type | |
10.122.90.1 fe-ff-ff-ff-ff-ff dynamic | |
10.122.91.255 ff-ff-ff-ff-ff-ff static | |
169.254.1.0 fe-ff-ff-ff-ff-ff dynamic | |
169.254.169.254 fe-ff-ff-ff-ff-ff dynamic | |
224.0.0.22 01-00-5e-00-00-16 static | |
224.0.0.252 01-00-5e-00-00-fc static | |
239.255.255.250 01-00-5e-7f-ff-fa static | |
255.255.255.255 ff-ff-ff-ff-ff-ff static | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: ---- End arp -a STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: ---- Begin arp -a STDERR ---- | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: ---- End arp -a STDERR ---- | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: Ran (arp -a) returned 0 | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: Using default interface for default ip and mac address | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: has_ec2_mac? == true | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: can_metadata_connect? == true | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: looks_like_ec2? == true | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: Loading plugin rackspace | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: Loading plugin eucalyptus | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: has_euca_mac? == false | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: has_euca_mac? == false | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: looks_like_euca? == false | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: Loading plugin command | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: Loading plugin dmi | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: Plugin dmi threw exception #<NameError: uninitialized constant Fcntl: | |
:F_SETFD> C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/mixin/command.rb:162:in `pope | |
n4' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/plugins/dmi.rb:46:in `from_file' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/mixin/from_file.rb:29:in `instance_eval | |
' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/mixin/from_file.rb:29:in `from_file' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:190:in `block in require_plug | |
in' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:185:in `each' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:185:in `require_plugin' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:117:in `block (2 levels) in a | |
ll_plugins' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:110:in `each' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:110:in `block in all_plugins' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:108:in `each' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:108:in `all_plugins' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/client.rb:208:in `run_ohai' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/client.rb:149:in `run' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:239:in `block in | |
run_application' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:229:in `loop' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:229:in `run_appli | |
cation' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application.rb:67:in `run' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/bin/chef-client:26:in `<top (required)>' | |
C:/opscode/chef/bin/chef-client:19:in `load' | |
C:/opscode/chef/bin/chef-client:19:in `<main>' | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: Loading plugin dmi_common | |
[Sat, 18 Feb 2012 17:03:51 +0000] DEBUG: Loading plugin erlang | |
[Sat, 18 Feb 2012 17:03:52 +0000] DEBUG: Failed to run: erl +V, assuming command not found | |
[Sat, 18 Feb 2012 17:03:52 +0000] DEBUG: ---- Begin erl +V STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:52 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:52 +0000] DEBUG: ---- End erl +V STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:52 +0000] DEBUG: ---- Begin erl +V STDERR ---- | |
[Sat, 18 Feb 2012 17:03:52 +0000] DEBUG: Failed to run: erl +V, assuming command not found | |
[Sat, 18 Feb 2012 17:03:52 +0000] DEBUG: ---- End erl +V STDERR ---- | |
[Sat, 18 Feb 2012 17:03:52 +0000] DEBUG: Ran (erl +V) returned 42 | |
[Sat, 18 Feb 2012 17:03:52 +0000] DEBUG: Loading plugin groovy | |
[Sat, 18 Feb 2012 17:03:53 +0000] DEBUG: Failed to run: groovy -v, assuming command not found | |
[Sat, 18 Feb 2012 17:03:53 +0000] DEBUG: ---- Begin groovy -v STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:53 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:53 +0000] DEBUG: ---- End groovy -v STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:53 +0000] DEBUG: ---- Begin groovy -v STDERR ---- | |
[Sat, 18 Feb 2012 17:03:53 +0000] DEBUG: Failed to run: groovy -v, assuming command not found | |
[Sat, 18 Feb 2012 17:03:53 +0000] DEBUG: ---- End groovy -v STDERR ---- | |
[Sat, 18 Feb 2012 17:03:53 +0000] DEBUG: Ran (groovy -v) returned 42 | |
[Sat, 18 Feb 2012 17:03:53 +0000] DEBUG: Loading plugin ip_scopes | |
[Sat, 18 Feb 2012 17:03:53 +0000] DEBUG: ip_scopes: cannot load gem, plugin disabled: no such file to load -- | |
ipaddr_extensions | |
[Sat, 18 Feb 2012 17:03:53 +0000] DEBUG: Loading plugin java | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: Failed to run: java -version, assuming command not found | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: ---- Begin java -version STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: ---- End java -version STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: ---- Begin java -version STDERR ---- | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: Failed to run: java -version, assuming command not found | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: ---- End java -version STDERR ---- | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: Ran (java -version) returned 42 | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: Loading plugin keys | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: Loading plugin lua | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: Failed to run: lua -v, assuming command not found | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: ---- Begin lua -v STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: ---- End lua -v STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: ---- Begin lua -v STDERR ---- | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: Failed to run: lua -v, assuming command not found | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: ---- End lua -v STDERR ---- | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: Ran (lua -v) returned 42 | |
[Sat, 18 Feb 2012 17:03:54 +0000] DEBUG: Loading plugin mono | |
[Sat, 18 Feb 2012 17:03:55 +0000] DEBUG: Failed to run: mono -V, assuming command not found | |
[Sat, 18 Feb 2012 17:03:55 +0000] DEBUG: ---- Begin mono -V STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:55 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:55 +0000] DEBUG: ---- End mono -V STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:55 +0000] DEBUG: ---- Begin mono -V STDERR ---- | |
[Sat, 18 Feb 2012 17:03:55 +0000] DEBUG: Failed to run: mono -V, assuming command not found | |
[Sat, 18 Feb 2012 17:03:55 +0000] DEBUG: ---- End mono -V STDERR ---- | |
[Sat, 18 Feb 2012 17:03:55 +0000] DEBUG: Ran (mono -V) returned 42 | |
[Sat, 18 Feb 2012 17:03:55 +0000] DEBUG: Loading plugin network_listeners | |
[Sat, 18 Feb 2012 17:03:55 +0000] DEBUG: Plugin network_listeners threw exception #<LoadError: no such file to | |
load -- sigar> C:/opscode/chef/embedded/lib/ruby/site_ruby/1.9.1/rubygems/custom_require.rb:36:in `require' | |
C:/opscode/chef/embedded/lib/ruby/site_ruby/1.9.1/rubygems/custom_require.rb:36:in `require' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/plugins/network_listeners.rb:19:in `fro | |
m_file' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/mixin/from_file.rb:29:in `instance_eval | |
' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/mixin/from_file.rb:29:in `from_file' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:190:in `block in require_plug | |
in' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:185:in `each' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:185:in `require_plugin' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:117:in `block (2 levels) in a | |
ll_plugins' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:110:in `each' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:110:in `block in all_plugins' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:108:in `each' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:108:in `all_plugins' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/client.rb:208:in `run_ohai' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/client.rb:149:in `run' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:239:in `block in | |
run_application' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:229:in `loop' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:229:in `run_appli | |
cation' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application.rb:67:in `run' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/bin/chef-client:26:in `<top (required)>' | |
C:/opscode/chef/bin/chef-client:19:in `load' | |
C:/opscode/chef/bin/chef-client:19:in `<main>' | |
[Sat, 18 Feb 2012 17:03:55 +0000] DEBUG: Loading plugin ohai | |
[Sat, 18 Feb 2012 17:03:55 +0000] DEBUG: Loading plugin ohai_time | |
[Sat, 18 Feb 2012 17:03:55 +0000] DEBUG: Loading plugin passwd | |
[Sat, 18 Feb 2012 17:03:55 +0000] DEBUG: Loading plugin perl | |
[Sat, 18 Feb 2012 17:03:56 +0000] DEBUG: ---- Begin perl -V:version -V:archname STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:56 +0000] DEBUG: version='5.8.8'; | |
archname='msys-64int'; | |
[Sat, 18 Feb 2012 17:03:56 +0000] DEBUG: ---- End perl -V:version -V:archname STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:56 +0000] DEBUG: ---- Begin perl -V:version -V:archname STDERR ---- | |
[Sat, 18 Feb 2012 17:03:56 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:56 +0000] DEBUG: ---- End perl -V:version -V:archname STDERR ---- | |
[Sat, 18 Feb 2012 17:03:56 +0000] DEBUG: Ran (perl -V:version -V:archname) returned 0 | |
[Sat, 18 Feb 2012 17:03:56 +0000] DEBUG: Loading plugin php | |
[Sat, 18 Feb 2012 17:03:57 +0000] DEBUG: Failed to run: php -v, assuming command not found | |
[Sat, 18 Feb 2012 17:03:57 +0000] DEBUG: ---- Begin php -v STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:57 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:57 +0000] DEBUG: ---- End php -v STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:57 +0000] DEBUG: ---- Begin php -v STDERR ---- | |
[Sat, 18 Feb 2012 17:03:57 +0000] DEBUG: Failed to run: php -v, assuming command not found | |
[Sat, 18 Feb 2012 17:03:57 +0000] DEBUG: ---- End php -v STDERR ---- | |
[Sat, 18 Feb 2012 17:03:57 +0000] DEBUG: Ran (php -v) returned 42 | |
[Sat, 18 Feb 2012 17:03:57 +0000] DEBUG: Loading plugin platform | |
[Sat, 18 Feb 2012 17:03:57 +0000] DEBUG: Loading plugin windows::platform | |
[Sat, 18 Feb 2012 17:03:57 +0000] DEBUG: Loading plugin python | |
[Sat, 18 Feb 2012 17:03:58 +0000] DEBUG: Failed to run: python -c "import sys; print sys.version", assuming co | |
mmand not found | |
[Sat, 18 Feb 2012 17:03:58 +0000] DEBUG: ---- Begin python -c "import sys; print sys.version" STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:58 +0000] DEBUG: | |
[Sat, 18 Feb 2012 17:03:58 +0000] DEBUG: ---- End python -c "import sys; print sys.version" STDOUT ---- | |
[Sat, 18 Feb 2012 17:03:58 +0000] DEBUG: ---- Begin python -c "import sys; print sys.version" STDERR ---- | |
[Sat, 18 Feb 2012 17:03:58 +0000] DEBUG: Failed to run: python -c "import sys; print sys.version", assuming co | |
mmand not found | |
[Sat, 18 Feb 2012 17:03:58 +0000] DEBUG: ---- End python -c "import sys; print sys.version" STDERR ---- | |
[Sat, 18 Feb 2012 17:03:58 +0000] DEBUG: Ran (python -c "import sys; print sys.version") returned 42 | |
[Sat, 18 Feb 2012 17:03:58 +0000] DEBUG: Loading plugin uptime | |
[Sat, 18 Feb 2012 17:03:58 +0000] DEBUG: Loading plugin virtualization | |
[Sat, 18 Feb 2012 17:03:58 +0000] DEBUG: Loading plugin windows::virtualization | |
[Sat, 18 Feb 2012 17:03:58 +0000] DEBUG: Plugin windows::virtualization threw exception #<IOError: Cannot open | |
or read C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/plugins/windows/virtualization | |
.rb!> C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/mixin/from_file.rb:31:in `from_fi | |
le' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:190:in `block in require_plug | |
in' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:185:in `each' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:185:in `require_plugin' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/plugins/virtualization.rb:21:in `from_f | |
ile' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/mixin/from_file.rb:29:in `instance_eval | |
' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/mixin/from_file.rb:29:in `from_file' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:190:in `block in require_plug | |
in' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:185:in `each' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:185:in `require_plugin' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:117:in `block (2 levels) in a | |
ll_plugins' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:110:in `each' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:110:in `block in all_plugins' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:108:in `each' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/ohai-0.6.10/lib/ohai/system.rb:108:in `all_plugins' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/client.rb:208:in `run_ohai' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/client.rb:149:in `run' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:239:in `block in | |
run_application' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:229:in `loop' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:229:in `run_appli | |
cation' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application.rb:67:in `run' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/bin/chef-client:26:in `<top (required)>' | |
C:/opscode/chef/bin/chef-client:19:in `load' | |
C:/opscode/chef/bin/chef-client:19:in `<main>' | |
[Sat, 18 Feb 2012 17:03:58 +0000] DEBUG: Loading plugin windows::cpu | |
[Sat, 18 Feb 2012 17:03:59 +0000] DEBUG: Loading plugin windows::filesystem | |
[Sat, 18 Feb 2012 17:03:59 +0000] DEBUG: Client key c:/chef/client.pem is present - skipping registration | |
[Sat, 18 Feb 2012 17:03:59 +0000] DEBUG: Building node object for ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:03:59 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:05 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:XPKIyzaDmGFyGStenynpzDhBAzI= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:03:59Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:03 | |
:59Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"Y/hKaq8CTozEHJdzPZ8FS30 | |
m4p1xl6vAXGf8QZBIRJBCMnbBCv2etcJpXMqt", "X-Ops-Authorization-2"=>"CpBHfEj+xJWi7C6HY9djM3yAHA2YdYvGsg+k1ZAHcZdy | |
zOdUmSjd3JvwPoPP", "X-Ops-Authorization-3"=>"24HMiEzm2ZXww6YDpvAWAk4+aHFxFwEqRfiZbVztMFT+lWpDvSuyi7+NfliL", "X | |
-Ops-Authorization-4"=>"76PPapV9w/evm4bxNdzcRXPh/kl4yXN8ku3F4TmhTJm5UAC6ENvSzT1TNAcb", "X-Ops-Authorization-5" | |
=>"LPqi3rG02oBz0glv9QH9mHO6RNOkWvBpNwFq1cmKa5XWwlpZZLYczwynswlQ", "X-Ops-Authorization-6"=>"gCIYMMvfRcUXF5nZpN | |
6vuQNFKuzmBmC6Ra66sv709Q=="} | |
[Sat, 18 Feb 2012 17:04:05 +0000] DEBUG: Sending HTTP Request via GET to api.opscode.com:443/organizations/bra | |
ttyredhead/nodes/ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:05 +0000] DEBUG: Extracting run list from JSON attributes provided on command line | |
[Sat, 18 Feb 2012 17:04:05 +0000] DEBUG: Applying attributes from json file | |
[Sat, 18 Feb 2012 17:04:05 +0000] DEBUG: Platform is windows version 6.0.6002 | |
[Sat, 18 Feb 2012 17:04:05 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:05 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:TyNEZ9b5oVo4I8SwVIACOVCQNU0= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:05Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:05Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"0OUIqI00AoO5+T+GtW0Symj | |
2QnGU8I/aGehGtuzgcbrtlemhVM8IxhYLDEvL", "X-Ops-Authorization-2"=>"gZGuvaC+wNL4WemgkLwL1onySlRemPxWv/QHUGZv4VsX | |
sY0xVPDei0zaW3ko", "X-Ops-Authorization-3"=>"4FgO3dzCwyBKW8pAs8JaFtbmARmJkiXu3JUoUP3IugEHR0Aye1uu2FrA3Q7T", "X | |
-Ops-Authorization-4"=>"q1lkx/p2CmkCJiS6I/NKBgihMx86knF9H1DD1d58EuASUup2mQZtTPQq0ZDo", "X-Ops-Authorization-5" | |
=>"+UeVqXqLpaAP5gWCwf+t/r/rF8qwwyxSNYMKNy3xAZOFJe/146bYVxBwwcvN", "X-Ops-Authorization-6"=>"ggRTM2POu5+ZscXzTz | |
hqX3g771zeLxpaKaxhHUmLDQ=="} | |
[Sat, 18 Feb 2012 17:04:05 +0000] DEBUG: Sending HTTP Request via GET to api.opscode.com:443/organizations/bra | |
ttyredhead/roles/sql | |
[Sat, 18 Feb 2012 17:04:06 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:06 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:UJk/v1x/TuoYEsIj1MzU4JjwTKs= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:06Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:06Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"hDJmyFFzLE1ttTQpelBomCm | |
N2nlBNtS8gk1Q+1zQdVhP31CFKeQYByvnLxw/", "X-Ops-Authorization-2"=>"Edrir05JzRr3PAcb/BFr7ybZCfspufPSShClGh1xk4zc | |
bqnBRbS2ApLn637h", "X-Ops-Authorization-3"=>"Lkcy2m25T0CuIS7XbCsY74zJvdnuUkpSD2GIjY/uor0u5kJGPSZl+rRHdkzv", "X | |
-Ops-Authorization-4"=>"/OERRKKmeIcAiNnbxIrJqP5gVmJs1emLKHxZ0+SQBfciSt6xUJI6Pl0UKJ6/", "X-Ops-Authorization-5" | |
=>"3q597mcCrrZFjTYhXRVHpi4aIIF2C4aVMk9a44sRB9ZZP9gsBjUxMAiPP1eA", "X-Ops-Authorization-6"=>"xaa+wZg48gKi3Fi0pm | |
G64jib9fTzq8HX1//UGMdorw=="} | |
[Sat, 18 Feb 2012 17:04:06 +0000] DEBUG: Sending HTTP Request via GET to api.opscode.com:443/organizations/bra | |
ttyredhead/roles/sql_base | |
[Sat, 18 Feb 2012 17:04:06 +0000] INFO: Run List is [role[sql]] | |
[Sat, 18 Feb 2012 17:04:06 +0000] INFO: Run List expands to [openssl, windows, sql_server::server] | |
[Sat, 18 Feb 2012 17:04:06 +0000] INFO: Starting Chef Run for ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:06 +0000] INFO: Running start handlers | |
[Sat, 18 Feb 2012 17:04:06 +0000] INFO: Start handlers complete. | |
[Sat, 18 Feb 2012 17:04:06 +0000] DEBUG: Synchronizing cookbooks | |
[Sat, 18 Feb 2012 17:04:06 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:06 +0000] DEBUG: String to sign: 'Method:POST | |
Hashed Path:V5B7KhUnbo0/Lvdmc1he8waUwLM= | |
X-Ops-Content-Hash:dSaIbCpyX2AYAVK8dH4B4gFSsos= | |
X-Ops-Timestamp:2012-02-18T17:04:06Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:06Z", "X-Ops-Content-Hash"=>"dSaIbCpyX2AYAVK8dH4B4gFSsos=", "X-Ops-Authorization-1"=>"I6bt2Fyp9M7WLFOCCdiKwtA | |
UEqPI/Euy5E2qy0w9TT3VIyqvG4YaJFH/Rxb+", "X-Ops-Authorization-2"=>"cRJtaQCeevjRvG8k4p6krLV0BkC/pyTbjsih3FSvq2Bj | |
WHCx4VaYuJGcp1KZ", "X-Ops-Authorization-3"=>"DouXbokzxBmc4v2D0bZQHZ1S/FcwUj9KqAUNhEulJsy62cHTRxFOfhoM+sYz", "X | |
-Ops-Authorization-4"=>"SU1D6YU79j2k3YB50BoYiTMC4PpPGBbJswuI5nH2qZJCFmb3kJBazmI0kDkL", "X-Ops-Authorization-5" | |
=>"a20ZBsDcbsGbykb13n6V817Fytz3qjl3aJOW1iMs3ga++kdrfhdIZQ8Rv6p/", "X-Ops-Authorization-6"=>"6TfSVNORsqRQWqyS9N | |
huUeiK4H+wrmbg0FZ7gZpJWw=="} | |
[Sat, 18 Feb 2012 17:04:06 +0000] DEBUG: Sending HTTP Request via POST to api.opscode.com:443/organizations/br | |
attyredhead/environments/_default/cookbook_versions | |
[Sat, 18 Feb 2012 17:04:07 +0000] INFO: Loading cookbooks [chef_handler, openssl, sql_server, windows] | |
[Sat, 18 Feb 2012 17:04:07 +0000] DEBUG: Cookbooks detail: {"sql_server"=>#<Chef::CookbookVersion:0x2d3f168 @n | |
ame="sql_server", @frozen=false, @attribute_filenames=["client.rb", "default.rb", "server.rb"], @definition_fi | |
lenames=[], @template_filenames=["ConfigurationFile.ini.erb", "restart.rb.erb"], @file_filenames=[], @recipe_f | |
ilenames=["client.rb", "default.rb", "server.rb"], @recipe_filenames_by_name={"client"=>"client.rb", "default" | |
=>"default.rb", "server"=>"server.rb"}, @library_filenames=["helper.rb"], @resource_filenames=[], @provider_fi | |
lenames=[], @metadata_filenames=[], @root_dir=nil, @root_filenames=["metadata.json", "metadata.rb", "README.md | |
"], @couchdb_id=nil, @couchdb=#<Chef::CouchDB:0x2d3f048 @db="chef", @rest=#<Chef::REST:0x2d3f030 @url="http:// | |
localhost:5984", @cookies={}, @default_headers={}, @auth_credentials=#<Chef::REST::AuthCredentials:0x2d3efe8 @ | |
key_file=nil, @client_name=nil>, @sign_request=true, @sign_on_redirect=true, @redirects_followed=0, @redirect_ | |
limit=10>>, @couchdb_rev=nil, @status=:ready, @manifest={"definitions"=>[], "name"=>"sql_server-1.0.4", "attri | |
butes"=>[{"name"=>"client.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization- | |
5beb2e18f5854d1a90067d55bcbe98d8/checksum-0dad586b72c47622851e9f163aad51ed?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA | |
&Expires=1329588248&Signature=bqVZxNW22pKKESuc0Kf9hVDnAhU%3D", "checksum"=>"0dad586b72c47622851e9f163aad51ed", | |
"path"=>"attributes/client.rb", "specificity"=>"default"}, {"name"=>"default.rb", "url"=>"https://s3.amazonaw | |
s.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-41bfed5c92529a2d | |
dd6141342f4e21cd?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=sNZ7Sj271gIw5eGeAZs5iOQ6HBg% | |
3D", "checksum"=>"41bfed5c92529a2ddd6141342f4e21cd", "path"=>"attributes/default.rb", "specificity"=>"default" | |
}, {"name"=>"server.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e | |
18f5854d1a90067d55bcbe98d8/checksum-c05f7b6b32109edbc16b4ec21c47be1f?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expir | |
es=1329588248&Signature=SW9sc%2FkAY0fGTHyB%2BHFTmJNouS4%3D", "checksum"=>"c05f7b6b32109edbc16b4ec21c47be1f", " | |
path"=>"attributes/server.rb", "specificity"=>"default"}], "files"=>[], "json_class"=>"Chef::CookbookVersion", | |
"providers"=>[], "metadata"=>{"name"=>"sql_server", "description"=>"Installs/Configures Microsoft SQL Server | |
2008 R2", "long_description"=>"Description\n===========\n\nInstalls and configures Microsoft SQL Server 2008 R | |
2 server and client. By default the Express edition is installed, but the `sql_server::server` recipe support | |
s installation of other editions (see __Usage__ below).\n\nRequirements\n============\n\nPlatform\n--------\n\ | |
nTested on\n\n* Windows Server 2008 R2\n\nMay work on other versions of Windows.\n\nAttributes\n==========\n\n | |
default\n-------\n\nThe following attributes are used by both client and server recipes.\n\n* `node['sql_serve | |
r']['accept_eula']` - indicate that you accept the terms of the end user license, default is 'false'\n* `node[ | |
'sql_server']['product_key']` - Specifies the product key for the edition of SQL Server, default is `nil` (not | |
needed for SQL Server 2008 R2 Express installs)\n\nclient\n------\n\nThis file also contains download url, ch | |
ecksum and package name for all client installation packages. See the __Usage__ section below for more detail | |
s.\n\nserver\n------\n\n* `node['sql_server']['install_dir']` - main directory for installation, default is `C | |
:\\Program Files\\Microsoft SQL Server`\n* `node['sql_server']['port']` - static TCP port server should listen | |
on for client connections, default is `1433`\n* `node['sql_server']['instance_name']` - name of the default i | |
nstance, default is `SQLEXPRESS`\n* `node['sql_server']['instance_dir']` - root directory of the default insta | |
nce, default is `C:\\Program Files\\Microsoft SQL Server`\n\nThis file also contains download url, checksum an | |
d package name for the server installation package.\n\nUsage\n=====\n\ndefault\n-------\n\nIncludes the `sql_s | |
erver::client` recipe.\n\nclient\n------\n\nInstalls required the SQL Server Native Client and all required de | |
pendancies. These include:\n\n* [Microsoft SQL Server 2008 R2 Native Client](http://www.microsoft.com/download | |
/en/details.aspx?id=16978#SNAC)\n* [Microsoft SQL Server 2008 R2 Command Line Utilities (ie `sqlcmd`)](http:// | |
www.microsoft.com/download/en/details.aspx?id=16978#SQLCMD)\n* [Microsoft SQL Server System CLR Types](http:// | |
www.microsoft.com/download/en/details.aspx?id=16978#SQLSYSCLR)\n* [Microsoft SQL Server 2008 R2 Management Obj | |
ects](http://www.microsoft.com/download/en/details.aspx?id=16978#SMO)\n* [Windows PowerShell Extensions for SQ | |
L Server 2008 R2](http://www.microsoft.com/download/en/details.aspx?id=16978#PowerShell)\n\nThe SQL Server Nat | |
ive Client contains the SQL Server ODBC driver and the SQL Server OLE DB provider in one native dynamic link l | |
ibrary (DLL) supporting applications using native-code APIs (ODBC, OLE DB and ADO) to Microsoft SQL Server. I | |
n simple terms these packages should allow any other node to act as a client of a SQL Server instance.\n\nThe | |
[TinyTDS](https://github.com/rails-sqlserver/tiny_tds) gem is also installed as this is used in the SQL Server | |
providers for the `database` and `database_user` resources (see the `database` cookbook for more details).\n\ | |
nserver\n------\n\nInstalls SQL Server 2008 R2 Express. The installation is done using the `windows_package` | |
resource and [ConfigurationFile](http://msdn.microsoft.com/en-us/library/dd239405.aspx) generated from a `temp | |
late` resource. The installation is slightly opinionated and does the following:\n\n* Enables [Mixed Mode](ht | |
tp://msdn.microsoft.com/en-us/library/aa905171\\(v=sql.80\\).aspx) (Windows Authentication and SQL Server Auth | |
entication) authentication\n* Auto-generates and sets a strong password for the 'sa' account\n* sets a static | |
TCP port which is configurable via an attribute.\n\nInstalling any of the SQL Server server or client packages | |
in an unattended/automated way requires you to explicitly indicate that you accept the terms of the end user | |
license. The hooks have been added to all recipes to do this via an attribute. Create a role to set the `node | |
['sql_server']['accept_license_terms']` attribute to 'true'. For example:\n\n % cat roles/sql_server.rb\n | |
name \"sql_server\"\n description \"SQL Server database master\"\n run_list(\n \"recipe[sql_serv | |
er::server]\"\n )\n default_attributes(\n \"sql_server\" => {\n \"accept_eula\" => true\n | |
}\n )\n\nOut of the box this recipe installs the Express edition of SQL Server 2008 R2. If you would li | |
ke to install the Standard edition create a role as follows:\n\n % cat roles/sql_server.rb\n name \"sql_ | |
server_standard\"\n description \"SQL Server Stadard edition database master\"\n run_list(\n \"reci | |
pe[sql_server::server]\"\n )\n default_attributes(\n \"sql_server\" => {\n \"instance_name\" | |
=> \"MSSQLSERVER\",\n \"product_key\" => \"YOUR_PRODUCT_KEY_HERE\",\n \"accept_eula\" => true,\ | |
n \"server\" => {\n \"url\" => \"DOWNLOAD_LOCATION_OF_INSTALLATION_PACKAGE\",\n \"che | |
cksum\" => \"SHA256_OF_INSTALLATION_PACKAGE\"\n }\n }\n )\n\nDepending on your base Windows ins | |
tallation you may also need to open the configured static port in the Windows Firewall. In the name of securi | |
ty we do not do this by default but the follow code should get the job done:\n\n # unlock port in firewall\ | |
n # this should leverage firewall_rule resource\n # once COOK-689 is completed\n firewall_rule_name = | |
\"\#{node['sql_server']['instance_name']} Static Port\"\n\n execute \"open-static-port\" do\n command | |
\"netsh advfirewall firewall add rule name=\\\"\#{firewall_rule_name}\\\" dir=in action=allow protocol=TCP lo | |
calport=\#{node['sql_server']['port']}\"\n returns [0,1,42] # *sigh* cmd.exe return codes are wonky\n | |
not_if { SqlServer::Helper.firewall_rule_enabled?(firewall_rule_name) }\n end\n\nChanges/Roadmap\n======= | |
========\n\n## Future\n\n* license distribution and management\n* multi instance support (via an LWRP)\n* clus | |
tering support\n\n## 1.0.4:\n\n* bump windows cookbook dependency version to pick up Ruby 1.9 compat fixes\n\n | |
## 1.0.2:\n\n* [COOK-773] win_friendly_path is no longer a module_function\n* rename accept_license_terms attr | |
ibute to accept_eula for consistency with other cookbooks like iis\n\n## 1.0.0:\n\n* [COOK-681] initial releas | |
e\n\nLicense and Author\n==================\n\nAuthor:: Seth Chisamore (<schisamo@opscode.com>)\n\nCopyright:: | |
2011, Opscode, Inc.\n\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use thi | |
s file except in compliance with the License.\nYou may obtain a copy of the License at\n\n http://www.apach | |
e.org/licenses/LICENSE-2.0\n\nUnless required by applicable law or agreed to in writing, software\ndistributed | |
under the License is distributed on an \"AS IS\" BASIS,\nWITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either | |
express or implied.\nSee the License for the specific language governing permissions and\nlimitations under t | |
he License.\n", "maintainer"=>"Opscode, Inc.", "maintainer_email"=>"cookbooks@opscode.com", "license"=>"Apache | |
2.0", "platforms"=>{"windows"=>">= 0.0.0"}, "dependencies"=>{"windows"=>">= 1.2.6", "openssl"=>">= 0.0.0"}, " | |
recommendations"=>{}, "suggestions"=>{}, "conflicting"=>{}, "providing"=>{"sql_server"=>">= 0.0.0", "sql_serve | |
r::server"=>">= 0.0.0", "sql_server::client"=>">= 0.0.0"}, "replacing"=>{}, "attributes"=>{}, "groupings"=>{}, | |
"recipes"=>{"sql_server"=>"", "sql_server::server"=>"", "sql_server::client"=>""}, "version"=>"1.0.4"}, "libr | |
aries"=>[{"name"=>"helper.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization- | |
5beb2e18f5854d1a90067d55bcbe98d8/checksum-5f9fc3142e6965f2aca8bca763d170ed?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA | |
&Expires=1329588248&Signature=gQbZYplhAQQ92QCfkHFld8SsI9g%3D", "checksum"=>"5f9fc3142e6965f2aca8bca763d170ed", | |
"path"=>"libraries/helper.rb", "specificity"=>"default"}], "templates"=>[{"name"=>"ConfigurationFile.ini.erb" | |
, "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe9 | |
8d8/checksum-49d6eb820a2e2ca8069c834326d04aac?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature | |
=1wHxEeNrVXtltRARhCERf5i%2BWLU%3D", "checksum"=>"49d6eb820a2e2ca8069c834326d04aac", "path"=>"templates/default | |
/ConfigurationFile.ini.erb", "specificity"=>"default"}, {"name"=>"restart.rb.erb", "url"=>"https://s3.amazonaw | |
s.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-48df9f4d2475994d | |
70b79f24d695c7f4?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=DDSK9ApXBd1fuuyoqylQXuNaNm4% | |
3D", "checksum"=>"48df9f4d2475994d70b79f24d695c7f4", "path"=>"templates/default/restart.rb.erb", "specificity" | |
=>"default"}], "resources"=>[], "cookbook_name"=>"sql_server", "version"=>"1.0.4", "recipes"=>[{"name"=>"clien | |
t.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55 | |
bcbe98d8/checksum-395e4cda614b462b151de31f384a4cb1?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Sign | |
ature=uBcBhcD7D6bvaNSEXar7dZoOuiI%3D", "checksum"=>"395e4cda614b462b151de31f384a4cb1", "path"=>"recipes/client | |
.rb", "specificity"=>"default"}, {"name"=>"default.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-prod | |
uction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-4e8c4dd49d3996831fa419098943e264?AWSAccessK | |
eyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=Uy%2Fsg9rJCzAcSgSLgNJjCnzPoJw%3D", "checksum"=>"4e8c4dd | |
49d3996831fa419098943e264", "path"=>"recipes/default.rb", "specificity"=>"default"}, {"name"=>"server.rb", "ur | |
l"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/c | |
hecksum-6e96fc65285000fbc04801b8b920dfe8?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=pI6n | |
iNhRZAOfhTkK7MOKAKAcDBY%3D", "checksum"=>"6e96fc65285000fbc04801b8b920dfe8", "path"=>"recipes/server.rb", "spe | |
cificity"=>"default"}], "root_files"=>[{"name"=>"metadata.json", "url"=>"https://s3.amazonaws.com/opscode-plat | |
form-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-07fd620a1cdc16d7949df298d1302093?A | |
WSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=0nwHAGurRvUFE9u12Zb62nrxncU%3D", "checksum"=>" | |
07fd620a1cdc16d7949df298d1302093", "path"=>"metadata.json", "specificity"=>"default"}, {"name"=>"metadata.rb", | |
"url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98 | |
d8/checksum-67f100703d5232d93f805c7d26e463b3?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature= | |
efgPuhiNvwGmlfwfDCSRkzHFoi0%3D", "checksum"=>"67f100703d5232d93f805c7d26e463b3", "path"=>"metadata.rb", "speci | |
ficity"=>"default"}, {"name"=>"README.md", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/o | |
rganization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-a28df86fd2692d11cb93507571e22b77?AWSAccessKeyId=AKIAJOZT | |
D2N26S7W6APA&Expires=1329588248&Signature=pSUnexTehzTMFfQyj1v5ls79WYI%3D", "checksum"=>"a28df86fd2692d11cb9350 | |
7571e22b77", "path"=>"README.md", "specificity"=>"default"}], "frozen?"=>false, "chef_type"=>"cookbook_version | |
"}, @file_vendor=nil, @metadata=#<Chef::Cookbook::Metadata:0x2d3e7a8 @cookbook=nil, @name="sql_server", @long_ | |
description="Description\n===========\n\nInstalls and configures Microsoft SQL Server 2008 R2 server and clien | |
t. By default the Express edition is installed, but the `sql_server::server` recipe supports installation of | |
other editions (see __Usage__ below).\n\nRequirements\n============\n\nPlatform\n--------\n\nTested on\n\n* Wi | |
ndows Server 2008 R2\n\nMay work on other versions of Windows.\n\nAttributes\n==========\n\ndefault\n-------\n | |
\nThe following attributes are used by both client and server recipes.\n\n* `node['sql_server']['accept_eula'] | |
` - indicate that you accept the terms of the end user license, default is 'false'\n* `node['sql_server']['pro | |
duct_key']` - Specifies the product key for the edition of SQL Server, default is `nil` (not needed for SQL Se | |
rver 2008 R2 Express installs)\n\nclient\n------\n\nThis file also contains download url, checksum and package | |
name for all client installation packages. See the __Usage__ section below for more details.\n\nserver\n---- | |
--\n\n* `node['sql_server']['install_dir']` - main directory for installation, default is `C:\\Program Files\\ | |
Microsoft SQL Server`\n* `node['sql_server']['port']` - static TCP port server should listen on for client con | |
nections, default is `1433`\n* `node['sql_server']['instance_name']` - name of the default instance, default i | |
s `SQLEXPRESS`\n* `node['sql_server']['instance_dir']` - root directory of the default instance, default is `C | |
:\\Program Files\\Microsoft SQL Server`\n\nThis file also contains download url, checksum and package name for | |
the server installation package.\n\nUsage\n=====\n\ndefault\n-------\n\nIncludes the `sql_server::client` rec | |
ipe.\n\nclient\n------\n\nInstalls required the SQL Server Native Client and all required dependancies. These | |
include:\n\n* [Microsoft SQL Server 2008 R2 Native Client](http://www.microsoft.com/download/en/details.aspx?i | |
d=16978#SNAC)\n* [Microsoft SQL Server 2008 R2 Command Line Utilities (ie `sqlcmd`)](http://www.microsoft.com/ | |
download/en/details.aspx?id=16978#SQLCMD)\n* [Microsoft SQL Server System CLR Types](http://www.microsoft.com/ | |
download/en/details.aspx?id=16978#SQLSYSCLR)\n* [Microsoft SQL Server 2008 R2 Management Objects](http://www.m | |
icrosoft.com/download/en/details.aspx?id=16978#SMO)\n* [Windows PowerShell Extensions for SQL Server 2008 R2]( | |
http://www.microsoft.com/download/en/details.aspx?id=16978#PowerShell)\n\nThe SQL Server Native Client contain | |
s the SQL Server ODBC driver and the SQL Server OLE DB provider in one native dynamic link library (DLL) suppo | |
rting applications using native-code APIs (ODBC, OLE DB and ADO) to Microsoft SQL Server. In simple terms the | |
se packages should allow any other node to act as a client of a SQL Server instance.\n\nThe [TinyTDS](https:// | |
github.com/rails-sqlserver/tiny_tds) gem is also installed as this is used in the SQL Server providers for the | |
`database` and `database_user` resources (see the `database` cookbook for more details).\n\nserver\n------\n\ | |
nInstalls SQL Server 2008 R2 Express. The installation is done using the `windows_package` resource and [Conf | |
igurationFile](http://msdn.microsoft.com/en-us/library/dd239405.aspx) generated from a `template` resource. T | |
he installation is slightly opinionated and does the following:\n\n* Enables [Mixed Mode](http://msdn.microsof | |
t.com/en-us/library/aa905171\\(v=sql.80\\).aspx) (Windows Authentication and SQL Server Authentication) authen | |
tication\n* Auto-generates and sets a strong password for the 'sa' account\n* sets a static TCP port which is | |
configurable via an attribute.\n\nInstalling any of the SQL Server server or client packages in an unattended/ | |
automated way requires you to explicitly indicate that you accept the terms of the end user license. The hooks | |
have been added to all recipes to do this via an attribute. Create a role to set the `node['sql_server']['ac | |
cept_license_terms']` attribute to 'true'. For example:\n\n % cat roles/sql_server.rb\n name \"sql_serv | |
er\"\n description \"SQL Server database master\"\n run_list(\n \"recipe[sql_server::server]\"\n | |
)\n default_attributes(\n \"sql_server\" => {\n \"accept_eula\" => true\n }\n )\n\nOut | |
of the box this recipe installs the Express edition of SQL Server 2008 R2. If you would like to install the | |
Standard edition create a role as follows:\n\n % cat roles/sql_server.rb\n name \"sql_server_standard\"\ | |
n description \"SQL Server Stadard edition database master\"\n run_list(\n \"recipe[sql_server::ser | |
ver]\"\n )\n default_attributes(\n \"sql_server\" => {\n \"instance_name\" => \"MSSQLSERVER\ | |
",\n \"product_key\" => \"YOUR_PRODUCT_KEY_HERE\",\n \"accept_eula\" => true,\n \"server\ | |
" => {\n \"url\" => \"DOWNLOAD_LOCATION_OF_INSTALLATION_PACKAGE\",\n \"checksum\" => \"SHA25 | |
6_OF_INSTALLATION_PACKAGE\"\n }\n }\n )\n\nDepending on your base Windows installation you may | |
also need to open the configured static port in the Windows Firewall. In the name of security we do not do th | |
is by default but the follow code should get the job done:\n\n # unlock port in firewall\n # this should | |
leverage firewall_rule resource\n # once COOK-689 is completed\n firewall_rule_name = \"\#{node['sql_se | |
rver']['instance_name']} Static Port\"\n\n execute \"open-static-port\" do\n command \"netsh advfirewa | |
ll firewall add rule name=\\\"\#{firewall_rule_name}\\\" dir=in action=allow protocol=TCP localport=\#{node['s | |
ql_server']['port']}\"\n returns [0,1,42] # *sigh* cmd.exe return codes are wonky\n not_if { SqlServ | |
er::Helper.firewall_rule_enabled?(firewall_rule_name) }\n end\n\nChanges/Roadmap\n===============\n\n## Fut | |
ure\n\n* license distribution and management\n* multi instance support (via an LWRP)\n* clustering support\n\n | |
## 1.0.4:\n\n* bump windows cookbook dependency version to pick up Ruby 1.9 compat fixes\n\n## 1.0.2:\n\n* [CO | |
OK-773] win_friendly_path is no longer a module_function\n* rename accept_license_terms attribute to accept_eu | |
la for consistency with other cookbooks like iis\n\n## 1.0.0:\n\n* [COOK-681] initial release\n\nLicense and A | |
uthor\n==================\n\nAuthor:: Seth Chisamore (<schisamo@opscode.com>)\n\nCopyright:: 2011, Opscode, In | |
c.\n\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in c | |
ompliance with the License.\nYou may obtain a copy of the License at\n\n http://www.apache.org/licenses/LIC | |
ENSE-2.0\n\nUnless required by applicable law or agreed to in writing, software\ndistributed under the License | |
is distributed on an \"AS IS\" BASIS,\nWITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implie | |
d.\nSee the License for the specific language governing permissions and\nlimitations under the License.\n", @m | |
aintainer="Opscode, Inc.", @maintainer_email="cookbooks@opscode.com", @license="Apache 2.0", @description="Ins | |
talls/Configures Microsoft SQL Server 2008 R2", @platforms={"windows"=>">= 0.0.0"}, @dependencies={"windows"=> | |
">= 1.2.6", "openssl"=>">= 0.0.0"}, @recommendations={}, @suggestions={}, @conflicting={}, @providing={"sql_se | |
rver"=>">= 0.0.0", "sql_server::server"=>">= 0.0.0", "sql_server::client"=>">= 0.0.0"}, @replacing={}, @attrib | |
utes={}, @groupings={}, @recipes={"sql_server"=>"", "sql_server::server"=>"", "sql_server::client"=>""}, @vers | |
ion="1.0.4">, @checksums={"395e4cda614b462b151de31f384a4cb1"=>nil, "4e8c4dd49d3996831fa419098943e264"=>nil, "6 | |
e96fc65285000fbc04801b8b920dfe8"=>nil, "5f9fc3142e6965f2aca8bca763d170ed"=>nil, "0dad586b72c47622851e9f163aad5 | |
1ed"=>nil, "41bfed5c92529a2ddd6141342f4e21cd"=>nil, "c05f7b6b32109edbc16b4ec21c47be1f"=>nil, "49d6eb820a2e2ca8 | |
069c834326d04aac"=>nil, "48df9f4d2475994d70b79f24d695c7f4"=>nil, "07fd620a1cdc16d7949df298d1302093"=>nil, "67f | |
100703d5232d93f805c7d26e463b3"=>nil, "a28df86fd2692d11cb93507571e22b77"=>nil}, @manifest_records_by_path={"rec | |
ipes/client.rb"=>{"name"=>"client.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organ | |
ization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-395e4cda614b462b151de31f384a4cb1?AWSAccessKeyId=AKIAJOZTD2N2 | |
6S7W6APA&Expires=1329588248&Signature=uBcBhcD7D6bvaNSEXar7dZoOuiI%3D", "checksum"=>"395e4cda614b462b151de31f38 | |
4a4cb1", "path"=>"recipes/client.rb", "specificity"=>"default"}, "recipes/default.rb"=>{"name"=>"default.rb", | |
"url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d | |
8/checksum-4e8c4dd49d3996831fa419098943e264?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=U | |
y%2Fsg9rJCzAcSgSLgNJjCnzPoJw%3D", "checksum"=>"4e8c4dd49d3996831fa419098943e264", "path"=>"recipes/default.rb" | |
, "specificity"=>"default"}, "recipes/server.rb"=>{"name"=>"server.rb", "url"=>"https://s3.amazonaws.com/opsco | |
de-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-6e96fc65285000fbc04801b8b92 | |
0dfe8?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=pI6niNhRZAOfhTkK7MOKAKAcDBY%3D", "check | |
sum"=>"6e96fc65285000fbc04801b8b920dfe8", "path"=>"recipes/server.rb", "specificity"=>"default"}, "libraries/h | |
elper.rb"=>{"name"=>"helper.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organizatio | |
n-5beb2e18f5854d1a90067d55bcbe98d8/checksum-5f9fc3142e6965f2aca8bca763d170ed?AWSAccessKeyId=AKIAJOZTD2N26S7W6A | |
PA&Expires=1329588248&Signature=gQbZYplhAQQ92QCfkHFld8SsI9g%3D", "checksum"=>"5f9fc3142e6965f2aca8bca763d170ed | |
", "path"=>"libraries/helper.rb", "specificity"=>"default"}, "attributes/client.rb"=>{"name"=>"client.rb", "ur | |
l"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/c | |
hecksum-0dad586b72c47622851e9f163aad51ed?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=bqVZ | |
xNW22pKKESuc0Kf9hVDnAhU%3D", "checksum"=>"0dad586b72c47622851e9f163aad51ed", "path"=>"attributes/client.rb", " | |
specificity"=>"default"}, "attributes/default.rb"=>{"name"=>"default.rb", "url"=>"https://s3.amazonaws.com/ops | |
code-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-41bfed5c92529a2ddd6141342 | |
f4e21cd?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=sNZ7Sj271gIw5eGeAZs5iOQ6HBg%3D", "che | |
cksum"=>"41bfed5c92529a2ddd6141342f4e21cd", "path"=>"attributes/default.rb", "specificity"=>"default"}, "attri | |
butes/server.rb"=>{"name"=>"server.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/orga | |
nization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-c05f7b6b32109edbc16b4ec21c47be1f?AWSAccessKeyId=AKIAJOZTD2N | |
26S7W6APA&Expires=1329588248&Signature=SW9sc%2FkAY0fGTHyB%2BHFTmJNouS4%3D", "checksum"=>"c05f7b6b32109edbc16b4 | |
ec21c47be1f", "path"=>"attributes/server.rb", "specificity"=>"default"}, "templates/default/ConfigurationFile. | |
ini.erb"=>{"name"=>"ConfigurationFile.ini.erb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-d | |
ata/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-49d6eb820a2e2ca8069c834326d04aac?AWSAccessKeyId=AKI | |
AJOZTD2N26S7W6APA&Expires=1329588248&Signature=1wHxEeNrVXtltRARhCERf5i%2BWLU%3D", "checksum"=>"49d6eb820a2e2ca | |
8069c834326d04aac", "path"=>"templates/default/ConfigurationFile.ini.erb", "specificity"=>"default"}, "templat | |
es/default/restart.rb.erb"=>{"name"=>"restart.rb.erb", "url"=>"https://s3.amazonaws.com/opscode-platform-produ | |
ction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-48df9f4d2475994d70b79f24d695c7f4?AWSAccessKe | |
yId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=DDSK9ApXBd1fuuyoqylQXuNaNm4%3D", "checksum"=>"48df9f4d24 | |
75994d70b79f24d695c7f4", "path"=>"templates/default/restart.rb.erb", "specificity"=>"default"}, "metadata.json | |
"=>{"name"=>"metadata.json", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5b | |
eb2e18f5854d1a90067d55bcbe98d8/checksum-07fd620a1cdc16d7949df298d1302093?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&E | |
xpires=1329588248&Signature=0nwHAGurRvUFE9u12Zb62nrxncU%3D", "checksum"=>"07fd620a1cdc16d7949df298d1302093", " | |
path"=>"metadata.json", "specificity"=>"default"}, "metadata.rb"=>{"name"=>"metadata.rb", "url"=>"https://s3.a | |
mazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-67f100703 | |
d5232d93f805c7d26e463b3?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=efgPuhiNvwGmlfwfDCSRk | |
zHFoi0%3D", "checksum"=>"67f100703d5232d93f805c7d26e463b3", "path"=>"metadata.rb", "specificity"=>"default"}, | |
"README.md"=>{"name"=>"README.md", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organizat | |
ion-5beb2e18f5854d1a90067d55bcbe98d8/checksum-a28df86fd2692d11cb93507571e22b77?AWSAccessKeyId=AKIAJOZTD2N26S7W | |
6APA&Expires=1329588248&Signature=pSUnexTehzTMFfQyj1v5ls79WYI%3D", "checksum"=>"a28df86fd2692d11cb93507571e22b | |
77", "path"=>"README.md", "specificity"=>"default"}}, @attribute_filenames_by_short_filename={"client"=>"clien | |
t.rb", "default"=>"default.rb", "server"=>"server.rb"}>, "windows"=>#<Chef::CookbookVersion:0x2d2bf68 @name="w | |
indows", @frozen=false, @attribute_filenames=["default.rb"], @definition_filenames=[], @template_filenames=[], | |
@file_filenames=["handlers/windows_reboot_handler.rb"], @recipe_filenames=["default.rb", "reboot_handler.rb"] | |
, @recipe_filenames_by_name={"default"=>"default.rb", "reboot_handler"=>"reboot_handler.rb"}, @library_filenam | |
es=["feature_base.rb", "registry_helper.rb", "helper.rb", "windows_privileged.rb", "version.rb", "ruby_19_patc | |
hes.rb"], @resource_filenames=["zipfile.rb", "package.rb", "registry.rb", "auto_run.rb", "reboot.rb", "path.rb | |
", "batch.rb", "feature.rb"], @provider_filenames=["registry.rb", "auto_run.rb", "path.rb", "feature_serverman | |
agercmd.rb", "zipfile.rb", "package.rb", "batch.rb", "feature_dism.rb", "reboot.rb"], @metadata_filenames=[], | |
@root_dir=nil, @root_filenames=["README.md", "metadata.rb", "metadata.json"], @couchdb_id=nil, @couchdb=#<Chef | |
::CouchDB:0x2d2be48 @db="chef", @rest=#<Chef::REST:0x2d2be30 @url="http://localhost:5984", @cookies={}, @defau | |
lt_headers={}, @auth_credentials=#<Chef::REST::AuthCredentials:0x2d2bde8 @key_file=nil, @client_name=nil>, @si | |
gn_request=true, @sign_on_redirect=true, @redirects_followed=0, @redirect_limit=10>>, @couchdb_rev=nil, @statu | |
s=:ready, @manifest={"definitions"=>[], "name"=>"windows-1.2.10", "files"=>[{"name"=>"handlers/windows_reboot_ | |
handler.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90 | |
067d55bcbe98d8/checksum-79a76ab34126d1e28c62c4f070b10dc9?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=132958824 | |
8&Signature=Pzy4Mt%2FQiuUuWp1prLr0o8jpgGQ%3D", "checksum"=>"79a76ab34126d1e28c62c4f070b10dc9", "path"=>"files/ | |
default/handlers/windows_reboot_handler.rb", "specificity"=>"default"}], "attributes"=>[{"name"=>"default.rb", | |
"url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98 | |
d8/checksum-eda001f275230230125ff1c8dbcd01af?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature= | |
Dk%2BTtSA2bjxDl0sVU4zJUrZnfpE%3D", "checksum"=>"eda001f275230230125ff1c8dbcd01af", "path"=>"attributes/default | |
.rb", "specificity"=>"default"}], "json_class"=>"Chef::CookbookVersion", "providers"=>[{"name"=>"registry.rb", | |
"url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98 | |
d8/checksum-2c46e31754b7e949a5857e2957bbc255?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature= | |
DqYKUVvu%2FlJBgqSDgXV%2B5I0LL2Q%3D", "checksum"=>"2c46e31754b7e949a5857e2957bbc255", "path"=>"providers/regist | |
ry.rb", "specificity"=>"default"}, {"name"=>"auto_run.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-p | |
roduction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-f52bafb5e9ce97d2a7258445b6b56406?AWSAcce | |
ssKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=a1l8JU0thZ%2BzJSOPi5KjODH5HUU%3D", "checksum"=>"f52b | |
afb5e9ce97d2a7258445b6b56406", "path"=>"providers/auto_run.rb", "specificity"=>"default"}, {"name"=>"path.rb", | |
"url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98 | |
d8/checksum-271dba97116e58581ea4c650386dd8f3?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature= | |
PnG8iJNzgPFoOWGHrfZrUreMHLo%3D", "checksum"=>"271dba97116e58581ea4c650386dd8f3", "path"=>"providers/path.rb", | |
"specificity"=>"default"}, {"name"=>"feature_servermanagercmd.rb", "url"=>"https://s3.amazonaws.com/opscode-pl | |
atform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-e58459cdaff6ef1bafb9fae64dffcc86 | |
?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=etgh%2B0ptFnOwNfiW9sFopDqN7a4%3D", "checksum | |
"=>"e58459cdaff6ef1bafb9fae64dffcc86", "path"=>"providers/feature_servermanagercmd.rb", "specificity"=>"defaul | |
t"}, {"name"=>"zipfile.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5be | |
b2e18f5854d1a90067d55bcbe98d8/checksum-7859415b67a1db7633695b1acc9704fd?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Ex | |
pires=1329588248&Signature=jkzyZ0b33AWcOr1t5r8ERcVmBg8%3D", "checksum"=>"7859415b67a1db7633695b1acc9704fd", "p | |
ath"=>"providers/zipfile.rb", "specificity"=>"default"}, {"name"=>"package.rb", "url"=>"https://s3.amazonaws.c | |
om/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-6aca1c8d5a8ad48c260 | |
e264f598e9bb4?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=EDnAPMUn1Ox88EY7Q4VB0Ll55W8%3D" | |
, "checksum"=>"6aca1c8d5a8ad48c260e264f598e9bb4", "path"=>"providers/package.rb", "specificity"=>"default"}, { | |
"name"=>"batch.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f58 | |
54d1a90067d55bcbe98d8/checksum-4b487ea5f4b20a2b17c761badcc55cfa?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=13 | |
29588248&Signature=1rKmNBsU%2FB50BxYzobpAIQYXBAQ%3D", "checksum"=>"4b487ea5f4b20a2b17c761badcc55cfa", "path"=> | |
"providers/batch.rb", "specificity"=>"default"}, {"name"=>"feature_dism.rb", "url"=>"https://s3.amazonaws.com/ | |
opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-706f2a6b16ed14193e45c3 | |
016a71a0c5?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=NYNHRzg20otEnu9PqfCRYrz96DE%3D", " | |
checksum"=>"706f2a6b16ed14193e45c3016a71a0c5", "path"=>"providers/feature_dism.rb", "specificity"=>"default"}, | |
{"name"=>"reboot.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18 | |
f5854d1a90067d55bcbe98d8/checksum-aa71d112a4856c8aaf422c7e8503e971?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires | |
=1329588248&Signature=RyoSysJRgZ3kD3VRmpFo0XhifJ4%3D", "checksum"=>"aa71d112a4856c8aaf422c7e8503e971", "path"= | |
>"providers/reboot.rb", "specificity"=>"default"}], "metadata"=>{"name"=>"windows", "description"=>"Provides a | |
set of useful Windows-specific primitives.", "long_description"=>"Description\n===========\n\nProvides a set | |
of Windows-specific primitives (Chef resources) meant to aid in the creation of cookbooks/recipes targeting th | |
e Windows platform.\n\nRequirements\n============\n\nPlatform\n--------\n\n* Windows XP\n* Windows Vista\n* Wi | |
ndows Server 2003 R2\n* Windows 7\n* Windows Server 2008 (R1, R2)\n\nCookbooks\n---------\n\n* chef_handler (` | |
windows::reboot_handler` leverages the chef_handler LWRP)\n\nAttributes\n==========\n\n* `node['windows']['all | |
ow_pending_reboots']` - used to configure the `WindowsRebootHandler` (via the `windows::reboot_handler` recipe | |
) to act on pending reboots. default is true (ie act on pending reboots). The value of this attribute only ha | |
s an effect if the `windows::reboot_handler` is in a node's run list.\n\nResource/Provider\n=================\ | |
n\nwindows\\_auto\\_run\n------------------\n\n### Actions\n- :create: Create an item to be run at login\n- :r | |
emove: Remove an item that was previously setup to run at login\n\n### Attribute Parameters\n- :name: Name att | |
ribute. The name of the value to be stored in the registry\n- :program: The program to be run at login\n- :arg | |
s: The arguments for the program\n\n### Examples\n\n # Run BGInfo at login\n windows_auto_run 'BGINFO' do\n | |
program \"C:/Sysinternals/bginfo.exe\"\n args \"\\\"C:/Sysinternals/Config.bgi\\\" /NOLICPROMPT /TIMER:0 | |
\"\n not_if { Registry.value_exists?(AUTO_RUN_KEY, 'BGINFO') }\n action :create\n end\n\n\nwindows\\_ba | |
tch\n--------------\nExecute a batch script using the cmd.exe interpreter (much like the script resources for | |
bash, csh, powershell, perl, python and ruby). A temporary file is created and executed like other script reso | |
urces, rather than run inline. By their nature, Script resources are not idempotent, as they are completely up | |
to the user's imagination. Use the `not_if` or `only_if` meta parameters to guard the resource for idempotenc | |
e.\n\n### Actions\n\n- :run: run the batch file\n\n### Attribute Parameters\n\n- command: name attribute. Name | |
of the command to execute.\n- code: quoted string of code to execute.\n- creates: a file this command creates | |
- if the file exists, the command will not be run.\n- cwd: current working directory to run the command from. | |
\n- flags: command line flags to pass to the interpreter when invoking.\n- user: A user name or user ID that w | |
e should change to before running this command.\n- group: A group name or group ID that we should change to be | |
fore running this command.\n\n### Examples\n\n windows_batch \"unzip_and_move_ruby\" do\n code <<-EOH\ | |
n 7z.exe x \#{Chef::Config[:file_cache_path]}/ruby-1.8.7-p352-i386-mingw32.7z -oC:\\\\source -r -y\n | |
xcopy C:\\\\source\\\\ruby-1.8.7-p352-i386-mingw32 C:\\\\ruby /e /y\n EOH\n end\n\n windows_batch | |
\"echo some env vars\" do\n code <<-EOH\n echo %TEMP%\n echo %SYSTEMDRIVE%\n echo %PATH%\ | |
n echo %WINDIR%\n EOH\n end\n\n\nwindows\\_feature\n----------------\n\nWindows Roles and Feature | |
s can be thought of as built-in operating system packages that ship with the OS. A server role is a set of so | |
ftware programs that, when they are installed and properly configured, lets a computer perform a specific func | |
tion for multiple users or other computers within a network. A Role can have multiple Role Services that prov | |
ide functionality to the Role. Role services are software programs that provide the functionality of a role. | |
Features are software programs that, although they are not directly parts of roles, can support or augment the | |
functionality of one or more roles, or improve the functionality of the server, regardless of which roles are | |
installed. Collectively we refer to all of these attributes as 'features'.\n\nThis resource allows you to ma | |
nage these 'features' in an unattended, idempotent way.\n\nThere are two providers for the `windows_features` | |
which map into Microsoft's two major tools for managing roles/features: [Deployment Image Servicing and Manage | |
ment (DISM)](http://msdn.microsoft.com/en-us/library/dd371719(v=vs.85).aspx) and [Servermanagercmd](http://tec | |
hnet.microsoft.com/en-us/library/ee344834(WS.10).aspx) (The CLI for Server Manager). As Servermanagercmd is d | |
eprecated, Chef will set the default provider to `Chef::Provider::WindowsFeature::DISM` if DISM is present on | |
the system being configured. The default provider will fall back to `Chef::Provider::WindowsFeature::ServerMa | |
nagerCmd`.\n\nFor more information on Roles, Role Services and Features see the [Microsoft TechNet article on | |
the topic](http://technet.microsoft.com/en-us/library/cc754923.aspx). For a complete list of all features tha | |
t are available on a node type either of the following commands at a command prompt:\n\n dism /online /Get- | |
Features\n servermanagercmd -query\n\n### Actions\n\n- :install: install a Windows role/feature\n- :remove: | |
remove a Windows role/feature\n\n### Attribute Parameters\n\n- feature_name: name of the feature/role to inst | |
all. The same feature may have different names depending on the provider used (ie DHCPServer vs DHCP; DNS-Ser | |
ver-Full-Role vs DNS).\n\n### Providers\n\n- **Chef::Provider::WindowsFeature::DISM**: Uses Deployment Image S | |
ervicing and Management (DISM) to manage roles/features.\n- **Chef::Provider::WindowsFeature::ServerManagerCmd | |
**: Uses Server Manager to manage roles/features.\n\n### Examples\n\n # enable the node as a DHCP Server\n | |
windows_feature \"DHCPServer\" do\n action :install\n end\n\n # enable TFTP\n windows_feature | |
\"TFTP\" do\n action :install\n end\n\n # disable Telnet client/server\n %w{ TelnetServer Telne | |
tClient }.each do |feature|\n windows_feature feature do\n action :remove\n end\n end\n\n | |
#\n\nwindows\\_package\n----------------\n\nManage Windows application packages in an unattended, idempoten | |
t way.\n\nThe following application installers are currently supported:\n\n* MSI packages\n* InstallShield\n* | |
Wise InstallMaster\n* Inno Setup\n* Nullsoft Scriptable Install System\n\nIf the proper installer type is not | |
passed into the resource's installer_type attribute, the provider will do it's best to identify the type by in | |
trospecting the installation package. If the installation type cannot be properly identified the `:custom` va | |
lue can be passed into the installer_type attribute along with the proper flags for silent/quiet installation | |
(using the `options` attribute..see example below).\n\n__PLEASE NOTE__ - For proper idempotence the resource's | |
`package_name` should be the same as the 'DisplayName' registry value in the uninstallation data that is crea | |
ted during package installation. The easiest way to definitively find the proper 'DisplayName' value is to in | |
stall the package on a machine and search for the uninstall information under the following registry keys:\n\n | |
* `HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Uninstall`\n* `HKEY_CURRENT_USER\\Softwar | |
e\\Microsoft\\Windows\\CurrentVersion\\Uninstall`\n* `HKEY_LOCAL_MACHINE\\Software\\Wow6464Node\\Microsoft\\Wi | |
ndows\\CurrentVersion\\Uninstall`\n\nFor maximum flexibility the `source` attribute supports both remote and l | |
ocal installation packages.\n\n### Actions\n\n- :install: install a package\n- :remove: remove a package. The | |
remove action is completely hit or miss as many application uninstallers do not support a full silent/quiet mo | |
de.\n\n### Attribute Parameters\n\n- package_name: name attribute. The 'DisplayName' of the application instal | |
lation package.\n- source: The source of the windows installer. This can either be a URI or a local path.\n- | |
installer_type: They type of windows installation package. valid values are: :msi, :inno, :nsis, :wise, :insta | |
llshield, :custom. If this value is not provided, the provider will do it's best to identify the installer ty | |
pe through introspection of the file.\n- checksum: useful if source is remote, the SHA-256 checksum of the fil | |
e--if the local file matches the checksum, Chef will not download it\n- options: Additional options to pass th | |
e underlying installation command\n\n### Examples\n\n # install PuTTY (InnoSetup installer)\n windows_pa | |
ckage \"PuTTY version 0.60\" do\n source \"http://the.earth.li/~sgtatham/putty/latest/x86/putty-0.60-inst | |
aller.exe\"\n installer_type :inno\n action :install\n end\n\n # install 7-Zip (MSI installer) | |
\n windows_package \"7-Zip 9.20 (x64 edition)\" do\n source \"http://downloads.sourceforge.net/sevenzi | |
p/7z920-x64.msi\"\n action :install\n end\n\n # install Notepad++ (Y U No Emacs?) using a local ins | |
taller\n windows_package \"Notepad++\" do\n source \"c:/installation_files/npp.5.9.2.Installer.exe\"\n | |
action :install\n end\n\n # install VLC for that Xvid (NSIS installer)\n windows_package \"VLC | |
media player 1.1.10\" do\n source \"http://superb-sea2.dl.sourceforge.net/project/vlc/1.1.10/win32/vlc-1. | |
1.10-win32.exe\"\n action :install\n end\n\n # install Firefox as custom installer and manually set | |
the silent install flags\n windows_package \"Mozilla Firefox 5.0 (x86 en-US)\" do\n source \"http://a | |
rchive.mozilla.org/pub/mozilla.org/mozilla.org/firefox/releases/5.0/win32/en-US/Firefox%20Setup%205.0.exe\"\n | |
options \"-ms\"\n installer_type :custom\n action :install\n end\n\n # Google Chrome FTW | |
(MSI installer)\n windows_package \"Google Chrome\" do\n source \"https://dl-ssl.google.com/tag/s/appg | |
uid%3D%7B8A69D345-D564-463C-AFF1-A69D9E530F96%7D%26iid%3D%7B806F36C0-CB54-4A84-A3F3-0CF8A86575E0%7D%26lang%3De | |
n%26browser%3D3%26usagestats%3D0%26appname%3DGoogle%2520Chrome%26needsadmin%3Dfalse/edgedl/chrome/install/Goog | |
leChromeStandaloneEnterprise.msi\"\n action :install\n end\n\n # remove Google Chrome (but why??)\n | |
windows_package \"Google Chrome\" do\n action :remove\n end\n\n # remove 7-Zip\n windows_pac | |
kage \"7-Zip 9.20 (x64 edition)\" do\n action :remove\n end\n\n\nwindows\\_reboot\n---------------\n\n | |
Sets required data in the node's run_state to notify `WindowsRebootHandler` a reboot is requested. If Chef ru | |
n completes successfully a reboot will occur if the `WindowsRebootHandler` is properly registered as a report | |
handler. As an action of `:request` will cause a node to reboot every Chef run, this resource is usually noti | |
fied by other resources...ie restart node after a package is installed (see example below).\n\n### Actions\n- | |
:request: requests a reboot at completion of successful Cher run. requires `WindowsRebootHandler` to be regis | |
tered as a report handler.\n- :cancel: remove reboot request from node.run_state. this will cancel *ALL* prev | |
iously requested reboots as this is a binary state.\n\n### Attribute Parameters\n- :timeout: Name attribute. t | |
imeout delay in seconds to wait before proceeding with the requested reboot. default is 60 seconds\n- :reason: | |
comment on the reason for the reboot. default is 'Opscode Chef initiated reboot'\n\n### Examples\n\n # if | |
the package installs, schedule a reboot at end of chef run\n windows_reboot 60 do\n reason 'cause chef | |
said so'\n action :nothing\n end\n windows_package 'some_package' do\n action :install\n | |
notifies :request, 'windows_reboot[60]'\n end\n\n # cancel the previously requested reboot\n windows | |
_reboot 60 do\n action :cancel\n end\n\nwindows\\_registry\n-----------------\n\nCreates and modifies | |
Windows registry keys.\n\n### Actions\n\n- :create: create a new registry key with the provided values.\n- :mo | |
dify: modify an existing registry key with the provided values.\n- :force_modify: modify an existing registry | |
key with the provided values. ensures the value is actually set by checking multiple times. useful for fighti | |
ng race conditions where two processes are trying to set the same registry key. This will be updated in the n | |
ear future to use 'RegNotifyChangeKeyValue' which is exposed by the WinAPI and allows a process to register fo | |
r notification on a registry key change.\n- :remove: removes a value from an existing registry key\n\n### Attr | |
ibute Parameters\n\n- key_name: name attribute. The registry key to create/modify.\n- values: hash of the valu | |
es to set under the registry key. The individual hash items will become respective 'Value name' => 'Value data | |
' items in the registry key.\n- type: Type of key to create, currently only used for :binary to create `REG_BI | |
NARY` registry keys. Must be a symbol. See __Roadmap__ for future plans.\n\n### Examples\n\n # make the loc | |
al windows proxy match the one set for Chef\n proxy = URI.parse(Chef::Config[:http_proxy])\n windows_reg | |
istry 'HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings' do\n values 'ProxyEnable' = | |
> 1, 'ProxyServer' => \"\#{proxy.host}:\#{proxy.port}\", 'ProxyOverride' => '<local>'\n end\n\n # enable | |
Remote Desktop and poke the firewall hole\n windows_registry 'HKLM\\SYSTEM\\CurrentControlSet\\Control\\Te | |
rminal Server' do\n values 'FdenyTSConnections' => 0\n end\n\n # Delete an item from the registry\n | |
windows_registry 'HKCU\\Software\\Test' do\n #Key is the name of the value that you want to delete th | |
e value is always empty\n values 'ValueToDelete' => ''\n action :remove\n end\n\n### Library Meth | |
ods\n\n Registry.value_exists?('HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run','BGINFO')\n Reg | |
istry.key_exists?('HKLM\\SOFTWARE\\Microsoft')\n BgInfo = Registry.get_value('HKLM\\SOFTWARE\\Microsoft\\Wi | |
ndows\\CurrentVersion\\Run','BGINFO')\n\n\nwindows\\_path\n-------------\n\n### Actions\n- :add: Add an item t | |
o the system path\n\n### Attribute Parameters\n- :path: Name attribute. The name of the value to add to the sy | |
stem path\n\n### Examples\n\n #Add Sysinternals to the system path\n windows_path 'C:\\Sysinternals' do\ | |
n action :add\n end\n\n\nwindows\\_zipfile\n----------------\n\nMost version of Windows do not ship wi | |
th native cli utility for managing compressed files. This resource provides a pure-ruby implementation for ma | |
naging zip files. Be sure to use the `not_if` or `only_if` meta parameters to guard the resource for idempoten | |
ce or action will be taken on the zip file every Chef run.\n\n### Actions\n\n- :unzip: unzip a compressed file | |
\n\n### Attribute Parameters\n\n- path: name attribute. The path where files will be unzipped to.\n- source: T | |
he source of the zip file. This can either be a URI or a local path.\n- overwrite: force an overwrite of the f | |
iles if the already exists.\n\n### Examples\n\n # unzip a remote zip file locally\n windows_zipfile \"c: | |
/bin\" do\n source \"http://download.sysinternals.com/Files/SysinternalsSuite.zip\"\n action :unzip\ | |
n not_if {::File.exists?(\"c:/bin/PsExec.exe\")}\n end\n\n # unzip a local zipfile\n windows_zip | |
file \"c:/the_codez\" do\n source \"c:/foo/baz/the_codez.zip\"\n action :unzip\n end\n\n\nExcepti | |
on/Report Handlers\n=========================\n\nWindowsRebootHandler\n--------------------\n\nRequired reboot | |
s are a necessary evil of configuring and managing Windows nodes. This report handler (ie fires at the end of | |
successful Chef runs) acts on requested (Chef initiated) or pending (as determined by the OS per configuratio | |
n action we performed) reboots. The `allow_pending_reboots` initialization argument should be set to false if | |
you do not want the handler to automatically reboot a node if it has been determined a reboot is pending. Re | |
boots can still be requested explicitly via the `windows_reboot` LWRP.\n\n## Initialization Arguments\n\n- `al | |
low_pending_reboots`: indicator on whether the handler should act on a the Window's 'pending reboot' state. de | |
fault is true\n- `timeout`: timeout delay in seconds to wait before proceeding with the reboot. default is 60 | |
seconds\n- `reason`: comment on the reason for the reboot. default is 'Opscode Chef initiated reboot'\n\nUsag | |
e\n=====\n\nJust place an explicit dependency on this cookbook (using depends in the cookbook's metadata.rb) f | |
rom any cookbook where you would like to use the Windows-specific resources/providers that ship with this cook | |
book.\n\ndefault\n-------\n\nConvenience recipe that installs supporting gems for many of the resources/provid | |
ers that ship with this cookbook.\n\nreboot\\_handler\n--------------\n\nLeverages the `chef_handler` LWRP to | |
register the `WindowsRebootHandler` report handler that ships as part of this cookbook. By default this handle | |
r is set to automatically act on pending reboots. If you would like to change this behavior override `node['w | |
indows']['allow_pending_reboots']` and set the value to false. For example:\n\n % cat roles/base.rb\n n | |
ame \"base\"\n description \"base role\"\n override_attributes(\n \"windows\" => {\n \"allow | |
_pending_reboots\" => false\n }\n )\n\nThis will still allow a reboot to be explicitly requested via t | |
he `windows_reboot` LWRP.\n\nChanges/Roadmap\n===============\n\n## Future\n\n* package preseeding/response_fi | |
le support\n* package installation location via a `target_dir` attribute.\n* [COOK-666] `windows_package` shou | |
ld support CoApp packages\n* windows_registry :force_modify action should use RegNotifyChangeKeyValue from Win | |
API\n* WindowsRebootHandler/`windows_reboot` LWRP should support kicking off subsequent chef run on reboot.\n* | |
Support all types of registry keys with `type` parameter in `windows_registry`.\n\n### v1.2.10\n\n* [COOK-939 | |
] - add `type` parameter to `windows_registry` to allow binary registry keys.\n* [COOK-940] - refactor logic s | |
o multiple values get created.\n\n### v1.2.8\n\n* FIX: Older Windows (Windows Server 2003) sometimes return 12 | |
7 on successful forked commands\n* FIX: `windows_package`, ensure we pass the WOW* registry redirection flags | |
into reg.open\n\n### v1.2.6\n\n* patch to fix [CHEF-2684], Open4 is named Open3 in Ruby 1.9\n* Ruby 1.9's Open | |
3 returns 0 and 42 for successful commands\n* retry keyword can only be used in a rescue block in Ruby 1.9\n\n | |
### v1.2.4\n\n* windows_package - catch Win32::Registry::Error that pops up when searching certain keys\n\n### | |
v1.2.2\n\n* combined numerous helper libarires for easier sharing across libaries/LWRPs\n* renamed Chef::Prov | |
ider::WindowsFeature::Base file to the more descriptive `feature_base.rb`\n* refactored windows_path LWRP\n * | |
:add action should MODIFY the the underlying ENV variable (vs CREATE)\n * deleted greedy :remove action unti | |
l it could be made more idempotent\n* added a windows_batch resource/provider for running batch scripts remote | |
ly\n\n### v1.2.0\n\n* [COOK-745] gracefully handle required server restarts on Windows platform\n * WindowsRe | |
bootHandler for requested and pending reboots\n * windows_reboot LWRP for requesting (receiving notifies) reb | |
oots\n * reboot_handler recipe for enabling WindowsRebootHandler as a report handler\n* [COOK-714] Correct in | |
itialize misspelling\n* RegistryHelper - new `get_values` method which returns all values for a particular key | |
.\n\n### v1.0.8\n\n* [COOK-719] resource/provider for managing windows features\n* [COOK-717] remove `windows_ | |
env_vars` resource as env resource exists in core chef\n* new `Windows::Version` helper class\n* refactored `W | |
indows::Helper` mixin\n\n### v1.0.6\n\n* added `force_modify` action to `windows_registry` resource\n* add `wi | |
n_friendly_path` helper\n* re-purpose default recipe to install useful supporting windows related gems\n\n### | |
v1.0.4\n\n* [COOK-700] new resources and improvements to the `windows_registry` provider (thanks Paul Morton!) | |
\n * Open the registry in the bitednes of the OS\n * Provide convenience methods to check if keys and values | |
exit\n * Provide convenience method for reading registry values\n * NEW - `windows_auto_run` resource/provi | |
der\n * NEW - `windows_env_vars` resource/provider\n * NEW - `windows_path` resource/provider\n* re-write of | |
the windows_package logic for determining current installed packages\n* new checksum attribute for windows_pa | |
ckage resource...useful for remote packages\n\n### v1.0.2:\n\n* [COOK-647] account for Wow6432Node registry re | |
directer\n* [COOK-656] begin/rescue on win32/registry\n\n### 1.0.0:\n\n* [COOK-612] initial release\n\nLicense | |
and Author\n==================\n\nAuthor:: Seth Chisamore (<schisamo@opscode.com>)\nAuthor:: Doug MacEachern | |
(<dougm@vmware.com>)\nAuthor:: Paul Morton (<pmorton@biaprotect.com>)\n\nCopyright:: 2011, Opscode, Inc.\nCopy | |
right:: 2010, VMware, Inc.\nCopyright:: 2011, Business Intelligence Associates, Inc\n\n\nLicensed under the Ap | |
ache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License. | |
\nYou may obtain a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\nUnless required | |
by applicable law or agreed to in writing, software\ndistributed under the License is distributed on an \"AS | |
IS\" BASIS,\nWITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\nSee the License for the | |
specific language governing permissions and\nlimitations under the License.\n", "maintainer"=>"Opscode, Inc." | |
, "maintainer_email"=>"cookbooks@opscode.com", "license"=>"Apache 2.0", "platforms"=>{"windows"=>">= 0.0.0"}, | |
"dependencies"=>{"chef_handler"=>">= 0.0.0"}, "recommendations"=>{}, "suggestions"=>{}, "conflicting"=>{}, "pr | |
oviding"=>{"windows"=>">= 0.0.0", "windows::reboot_handler"=>">= 0.0.0"}, "replacing"=>{}, "attributes"=>{}, " | |
groupings"=>{}, "recipes"=>{"windows"=>"", "windows::reboot_handler"=>""}, "version"=>"1.2.10"}, "templates"=> | |
[], "resources"=>[{"name"=>"zipfile.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/org | |
anization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-f96479910ab96b5f06315c0ca0b302a4?AWSAccessKeyId=AKIAJOZTD2 | |
N26S7W6APA&Expires=1329588248&Signature=Qq7hFcs2Yz8CQRt8VCgDL6WYDjA%3D", "checksum"=>"f96479910ab96b5f06315c0c | |
a0b302a4", "path"=>"resources/zipfile.rb", "specificity"=>"default"}, {"name"=>"package.rb", "url"=>"https://s | |
3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-5317f1 | |
7e18e8edf0dbed3b67f2a0487d?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=Kk9pUI3vtbQcttnkjn | |
%2BcDb0j6zM%3D", "checksum"=>"5317f17e18e8edf0dbed3b67f2a0487d", "path"=>"resources/package.rb", "specificity" | |
=>"default"}, {"name"=>"registry.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organi | |
zation-5beb2e18f5854d1a90067d55bcbe98d8/checksum-c58c55315e2898eb773c1bde8d585709?AWSAccessKeyId=AKIAJOZTD2N26 | |
S7W6APA&Expires=1329588248&Signature=3tQ0YT0Th%2Bntah8hm279FJGc800%3D", "checksum"=>"c58c55315e2898eb773c1bde8 | |
d585709", "path"=>"resources/registry.rb", "specificity"=>"default"}, {"name"=>"auto_run.rb", "url"=>"https:// | |
s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-8916c | |
5b22a18c87947dff58b71b974af?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=suXa1WlTvHI0o1TmC | |
DhnkosQZI8%3D", "checksum"=>"8916c5b22a18c87947dff58b71b974af", "path"=>"resources/auto_run.rb", "specificity" | |
=>"default"}, {"name"=>"reboot.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organiza | |
tion-5beb2e18f5854d1a90067d55bcbe98d8/checksum-b8472303b776c2322600a0751c815395?AWSAccessKeyId=AKIAJOZTD2N26S7 | |
W6APA&Expires=1329588248&Signature=%2Fci%2F%2B7kH0CLOaDIwtLpcSVzQpWs%3D", "checksum"=>"b8472303b776c2322600a07 | |
51c815395", "path"=>"resources/reboot.rb", "specificity"=>"default"}, {"name"=>"path.rb", "url"=>"https://s3.a | |
mazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-848bd700c | |
257e846d1011bda420d54e8?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=ds2sh%2B8O02e%2F73vdT | |
zW8QwPTrzA%3D", "checksum"=>"848bd700c257e846d1011bda420d54e8", "path"=>"resources/path.rb", "specificity"=>"d | |
efault"}, {"name"=>"batch.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization- | |
5beb2e18f5854d1a90067d55bcbe98d8/checksum-53fe31b998dfd009d7b8f58fa2380c0c?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA | |
&Expires=1329588248&Signature=7uziTu%2BWkHNxkHjWiqw54AXCSMs%3D", "checksum"=>"53fe31b998dfd009d7b8f58fa2380c0c | |
", "path"=>"resources/batch.rb", "specificity"=>"default"}, {"name"=>"feature.rb", "url"=>"https://s3.amazonaw | |
s.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-60e1a5b1b17dfc60 | |
285fb28fcd3870be?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=UAIlMzAJ%2Bgin%2Bgh9zd9hAvPw | |
gX0%3D", "checksum"=>"60e1a5b1b17dfc60285fb28fcd3870be", "path"=>"resources/feature.rb", "specificity"=>"defau | |
lt"}], "libraries"=>[{"name"=>"feature_base.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production- | |
data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-568fe3411d4a69f1c3c9b32780b24cf7?AWSAccessKeyId=AK | |
IAJOZTD2N26S7W6APA&Expires=1329588248&Signature=qFm%2BeREpTVIBnSFK%2BDKjWfmLpPQ%3D", "checksum"=>"568fe3411d4a | |
69f1c3c9b32780b24cf7", "path"=>"libraries/feature_base.rb", "specificity"=>"default"}, {"name"=>"registry_help | |
er.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d5 | |
5bcbe98d8/checksum-76f502ee18c89d7beb68e7f13ab0e9c0?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Sig | |
nature=7eiaV4gS4XGC8e46twRX7fNUgIc%3D", "checksum"=>"76f502ee18c89d7beb68e7f13ab0e9c0", "path"=>"libraries/reg | |
istry_helper.rb", "specificity"=>"default"}, {"name"=>"helper.rb", "url"=>"https://s3.amazonaws.com/opscode-pl | |
atform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-cead86571eaa50734abbcdfc608025fd | |
?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=nqwmQDawggxfeZRUVxC7Or14nNw%3D", "checksum"= | |
>"cead86571eaa50734abbcdfc608025fd", "path"=>"libraries/helper.rb", "specificity"=>"default"}, {"name"=>"windo | |
ws_privileged.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f585 | |
4d1a90067d55bcbe98d8/checksum-724ecf2579c182dff0f21a92b262256e?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=132 | |
9588248&Signature=nDsYVKjkkl2E%2FrXJSv4vjWjneGY%3D", "checksum"=>"724ecf2579c182dff0f21a92b262256e", "path"=>" | |
libraries/windows_privileged.rb", "specificity"=>"default"}, {"name"=>"version.rb", "url"=>"https://s3.amazona | |
ws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-9b20966748f370b | |
153659189191c3859?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=mpkkFFnwcaYqQwHOZA2AwP30OZc | |
%3D", "checksum"=>"9b20966748f370b153659189191c3859", "path"=>"libraries/version.rb", "specificity"=>"default" | |
}, {"name"=>"ruby_19_patches.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organizati | |
on-5beb2e18f5854d1a90067d55bcbe98d8/checksum-6b1e4d953a821a36e60a3a434783a42b?AWSAccessKeyId=AKIAJOZTD2N26S7W6 | |
APA&Expires=1329588248&Signature=G9RyT4s5spgs4NKsCz36NmjLsSM%3D", "checksum"=>"6b1e4d953a821a36e60a3a434783a42 | |
b", "path"=>"libraries/ruby_19_patches.rb", "specificity"=>"default"}], "cookbook_name"=>"windows", "version"= | |
>"1.2.10", "recipes"=>[{"name"=>"default.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-dat | |
a/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-b8f4746c0dc02ee922751006fa0b9c3f?AWSAccessKeyId=AKIAJ | |
OZTD2N26S7W6APA&Expires=1329588248&Signature=KedGzMRkiQl%2B06ul%2BNZG6X%2BgdvA%3D", "checksum"=>"b8f4746c0dc02 | |
ee922751006fa0b9c3f", "path"=>"recipes/default.rb", "specificity"=>"default"}, {"name"=>"reboot_handler.rb", " | |
url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8 | |
/checksum-a55d8ab514d9d9efae136a872711f80f?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=mI | |
ziC4oaEAS3MdlZ4EHUQMdjOH4%3D", "checksum"=>"a55d8ab514d9d9efae136a872711f80f", "path"=>"recipes/reboot_handler | |
.rb", "specificity"=>"default"}], "root_files"=>[{"name"=>"README.md", "url"=>"https://s3.amazonaws.com/opscod | |
e-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-d00cacbe68f1a7257ca40e0ae892 | |
93d7?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=jNiEbHYq4b%2BVzm6FDiD8n1H7OnU%3D", "chec | |
ksum"=>"d00cacbe68f1a7257ca40e0ae89293d7", "path"=>"README.md", "specificity"=>"default"}, {"name"=>"metadata. | |
rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bc | |
be98d8/checksum-fe5055d81afa103bc3e47692daa2aa9f?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signat | |
ure=6ZJpwHTTJA0R1E6mAls9%2Bb2%2Fw7s%3D", "checksum"=>"fe5055d81afa103bc3e47692daa2aa9f", "path"=>"metadata.rb" | |
, "specificity"=>"default"}, {"name"=>"metadata.json", "url"=>"https://s3.amazonaws.com/opscode-platform-produ | |
ction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-64a0f1e6dafcaa4a5a5077a0dd07a430?AWSAccessKe | |
yId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=%2F910xraF%2FCEOqCZ%2FnNdIsLvNTUU%3D", "checksum"=>"64a0 | |
f1e6dafcaa4a5a5077a0dd07a430", "path"=>"metadata.json", "specificity"=>"default"}], "frozen?"=>false, "chef_ty | |
pe"=>"cookbook_version"}, @file_vendor=nil, @metadata=#<Chef::Cookbook::Metadata:0x2d2b5a8 @cookbook=nil, @nam | |
e="windows", @long_description="Description\n===========\n\nProvides a set of Windows-specific primitives (Che | |
f resources) meant to aid in the creation of cookbooks/recipes targeting the Windows platform.\n\nRequirements | |
\n============\n\nPlatform\n--------\n\n* Windows XP\n* Windows Vista\n* Windows Server 2003 R2\n* Windows 7\n | |
* Windows Server 2008 (R1, R2)\n\nCookbooks\n---------\n\n* chef_handler (`windows::reboot_handler` leverages | |
the chef_handler LWRP)\n\nAttributes\n==========\n\n* `node['windows']['allow_pending_reboots']` - used to con | |
figure the `WindowsRebootHandler` (via the `windows::reboot_handler` recipe) to act on pending reboots. defaul | |
t is true (ie act on pending reboots). The value of this attribute only has an effect if the `windows::reboot | |
_handler` is in a node's run list.\n\nResource/Provider\n=================\n\nwindows\\_auto\\_run\n---------- | |
--------\n\n### Actions\n- :create: Create an item to be run at login\n- :remove: Remove an item that was prev | |
iously setup to run at login\n\n### Attribute Parameters\n- :name: Name attribute. The name of the value to be | |
stored in the registry\n- :program: The program to be run at login\n- :args: The arguments for the program\n\ | |
n### Examples\n\n # Run BGInfo at login\n windows_auto_run 'BGINFO' do\n program \"C:/Sysinternals/bginfo | |
.exe\"\n args \"\\\"C:/Sysinternals/Config.bgi\\\" /NOLICPROMPT /TIMER:0\"\n not_if { Registry.value_exi | |
sts?(AUTO_RUN_KEY, 'BGINFO') }\n action :create\n end\n\n\nwindows\\_batch\n--------------\nExecute a batc | |
h script using the cmd.exe interpreter (much like the script resources for bash, csh, powershell, perl, python | |
and ruby). A temporary file is created and executed like other script resources, rather than run inline. By t | |
heir nature, Script resources are not idempotent, as they are completely up to the user's imagination. Use the | |
`not_if` or `only_if` meta parameters to guard the resource for idempotence.\n\n### Actions\n\n- :run: run th | |
e batch file\n\n### Attribute Parameters\n\n- command: name attribute. Name of the command to execute.\n- code | |
: quoted string of code to execute.\n- creates: a file this command creates - if the file exists, the command | |
will not be run.\n- cwd: current working directory to run the command from.\n- flags: command line flags to pa | |
ss to the interpreter when invoking.\n- user: A user name or user ID that we should change to before running t | |
his command.\n- group: A group name or group ID that we should change to before running this command.\n\n### E | |
xamples\n\n windows_batch \"unzip_and_move_ruby\" do\n code <<-EOH\n 7z.exe x \#{Chef::Config[:fi | |
le_cache_path]}/ruby-1.8.7-p352-i386-mingw32.7z -oC:\\\\source -r -y\n xcopy C:\\\\source\\\\ruby-1.8.7- | |
p352-i386-mingw32 C:\\\\ruby /e /y\n EOH\n end\n\n windows_batch \"echo some env vars\" do\n c | |
ode <<-EOH\n echo %TEMP%\n echo %SYSTEMDRIVE%\n echo %PATH%\n echo %WINDIR%\n EOH\n | |
end\n\n\nwindows\\_feature\n----------------\n\nWindows Roles and Features can be thought of as built-in ope | |
rating system packages that ship with the OS. A server role is a set of software programs that, when they are | |
installed and properly configured, lets a computer perform a specific function for multiple users or other co | |
mputers within a network. A Role can have multiple Role Services that provide functionality to the Role. Rol | |
e services are software programs that provide the functionality of a role. Features are software programs that | |
, although they are not directly parts of roles, can support or augment the functionality of one or more roles | |
, or improve the functionality of the server, regardless of which roles are installed. Collectively we refer | |
to all of these attributes as 'features'.\n\nThis resource allows you to manage these 'features' in an unatten | |
ded, idempotent way.\n\nThere are two providers for the `windows_features` which map into Microsoft's two majo | |
r tools for managing roles/features: [Deployment Image Servicing and Management (DISM)](http://msdn.microsoft. | |
com/en-us/library/dd371719(v=vs.85).aspx) and [Servermanagercmd](http://technet.microsoft.com/en-us/library/ee | |
344834(WS.10).aspx) (The CLI for Server Manager). As Servermanagercmd is deprecated, Chef will set the defaul | |
t provider to `Chef::Provider::WindowsFeature::DISM` if DISM is present on the system being configured. The d | |
efault provider will fall back to `Chef::Provider::WindowsFeature::ServerManagerCmd`.\n\nFor more information | |
on Roles, Role Services and Features see the [Microsoft TechNet article on the topic](http://technet.microsoft | |
.com/en-us/library/cc754923.aspx). For a complete list of all features that are available on a node type eith | |
er of the following commands at a command prompt:\n\n dism /online /Get-Features\n servermanagercmd -que | |
ry\n\n### Actions\n\n- :install: install a Windows role/feature\n- :remove: remove a Windows role/feature\n\n# | |
## Attribute Parameters\n\n- feature_name: name of the feature/role to install. The same feature may have dif | |
ferent names depending on the provider used (ie DHCPServer vs DHCP; DNS-Server-Full-Role vs DNS).\n\n### Provi | |
ders\n\n- **Chef::Provider::WindowsFeature::DISM**: Uses Deployment Image Servicing and Management (DISM) to m | |
anage roles/features.\n- **Chef::Provider::WindowsFeature::ServerManagerCmd**: Uses Server Manager to manage r | |
oles/features.\n\n### Examples\n\n # enable the node as a DHCP Server\n windows_feature \"DHCPServer\" d | |
o\n action :install\n end\n\n # enable TFTP\n windows_feature \"TFTP\" do\n action :install | |
\n end\n\n # disable Telnet client/server\n %w{ TelnetServer TelnetClient }.each do |feature|\n | |
windows_feature feature do\n action :remove\n end\n end\n\n #\n\nwindows\\_package\n-------- | |
--------\n\nManage Windows application packages in an unattended, idempotent way.\n\nThe following application | |
installers are currently supported:\n\n* MSI packages\n* InstallShield\n* Wise InstallMaster\n* Inno Setup\n* | |
Nullsoft Scriptable Install System\n\nIf the proper installer type is not passed into the resource's installe | |
r_type attribute, the provider will do it's best to identify the type by introspecting the installation packag | |
e. If the installation type cannot be properly identified the `:custom` value can be passed into the installe | |
r_type attribute along with the proper flags for silent/quiet installation (using the `options` attribute..see | |
example below).\n\n__PLEASE NOTE__ - For proper idempotence the resource's `package_name` should be the same | |
as the 'DisplayName' registry value in the uninstallation data that is created during package installation. T | |
he easiest way to definitively find the proper 'DisplayName' value is to install the package on a machine and | |
search for the uninstall information under the following registry keys:\n\n* `HKEY_LOCAL_MACHINE\\Software\\Mi | |
crosoft\\Windows\\CurrentVersion\\Uninstall`\n* `HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersi | |
on\\Uninstall`\n* `HKEY_LOCAL_MACHINE\\Software\\Wow6464Node\\Microsoft\\Windows\\CurrentVersion\\Uninstall`\n | |
\nFor maximum flexibility the `source` attribute supports both remote and local installation packages.\n\n### | |
Actions\n\n- :install: install a package\n- :remove: remove a package. The remove action is completely hit or | |
miss as many application uninstallers do not support a full silent/quiet mode.\n\n### Attribute Parameters\n\n | |
- package_name: name attribute. The 'DisplayName' of the application installation package.\n- source: The sour | |
ce of the windows installer. This can either be a URI or a local path.\n- installer_type: They type of window | |
s installation package. valid values are: :msi, :inno, :nsis, :wise, :installshield, :custom. If this value i | |
s not provided, the provider will do it's best to identify the installer type through introspection of the fil | |
e.\n- checksum: useful if source is remote, the SHA-256 checksum of the file--if the local file matches the ch | |
ecksum, Chef will not download it\n- options: Additional options to pass the underlying installation command\n | |
\n### Examples\n\n # install PuTTY (InnoSetup installer)\n windows_package \"PuTTY version 0.60\" do\n | |
source \"http://the.earth.li/~sgtatham/putty/latest/x86/putty-0.60-installer.exe\"\n installer_type : | |
inno\n action :install\n end\n\n # install 7-Zip (MSI installer)\n windows_package \"7-Zip 9.20 | |
(x64 edition)\" do\n source \"http://downloads.sourceforge.net/sevenzip/7z920-x64.msi\"\n action :in | |
stall\n end\n\n # install Notepad++ (Y U No Emacs?) using a local installer\n windows_package \"Notep | |
ad++\" do\n source \"c:/installation_files/npp.5.9.2.Installer.exe\"\n action :install\n end\n\n | |
# install VLC for that Xvid (NSIS installer)\n windows_package \"VLC media player 1.1.10\" do\n sou | |
rce \"http://superb-sea2.dl.sourceforge.net/project/vlc/1.1.10/win32/vlc-1.1.10-win32.exe\"\n action :ins | |
tall\n end\n\n # install Firefox as custom installer and manually set the silent install flags\n wind | |
ows_package \"Mozilla Firefox 5.0 (x86 en-US)\" do\n source \"http://archive.mozilla.org/pub/mozilla.org/ | |
mozilla.org/firefox/releases/5.0/win32/en-US/Firefox%20Setup%205.0.exe\"\n options \"-ms\"\n install | |
er_type :custom\n action :install\n end\n\n # Google Chrome FTW (MSI installer)\n windows_packag | |
e \"Google Chrome\" do\n source \"https://dl-ssl.google.com/tag/s/appguid%3D%7B8A69D345-D564-463C-AFF1-A6 | |
9D9E530F96%7D%26iid%3D%7B806F36C0-CB54-4A84-A3F3-0CF8A86575E0%7D%26lang%3Den%26browser%3D3%26usagestats%3D0%26 | |
appname%3DGoogle%2520Chrome%26needsadmin%3Dfalse/edgedl/chrome/install/GoogleChromeStandaloneEnterprise.msi\"\ | |
n action :install\n end\n\n # remove Google Chrome (but why??)\n windows_package \"Google Chrome | |
\" do\n action :remove\n end\n\n # remove 7-Zip\n windows_package \"7-Zip 9.20 (x64 edition)\" d | |
o\n action :remove\n end\n\n\nwindows\\_reboot\n---------------\n\nSets required data in the node's ru | |
n_state to notify `WindowsRebootHandler` a reboot is requested. If Chef run completes successfully a reboot w | |
ill occur if the `WindowsRebootHandler` is properly registered as a report handler. As an action of `:request | |
` will cause a node to reboot every Chef run, this resource is usually notified by other resources...ie restar | |
t node after a package is installed (see example below).\n\n### Actions\n- :request: requests a reboot at comp | |
letion of successful Cher run. requires `WindowsRebootHandler` to be registered as a report handler.\n- :canc | |
el: remove reboot request from node.run_state. this will cancel *ALL* previously requested reboots as this is | |
a binary state.\n\n### Attribute Parameters\n- :timeout: Name attribute. timeout delay in seconds to wait bef | |
ore proceeding with the requested reboot. default is 60 seconds\n- :reason: comment on the reason for the rebo | |
ot. default is 'Opscode Chef initiated reboot'\n\n### Examples\n\n # if the package installs, schedule a re | |
boot at end of chef run\n windows_reboot 60 do\n reason 'cause chef said so'\n action :nothing\n | |
end\n windows_package 'some_package' do\n action :install\n notifies :request, 'windows_reboot | |
[60]'\n end\n\n # cancel the previously requested reboot\n windows_reboot 60 do\n action :cancel | |
\n end\n\nwindows\\_registry\n-----------------\n\nCreates and modifies Windows registry keys.\n\n### Actio | |
ns\n\n- :create: create a new registry key with the provided values.\n- :modify: modify an existing registry k | |
ey with the provided values.\n- :force_modify: modify an existing registry key with the provided values. ensu | |
res the value is actually set by checking multiple times. useful for fighting race conditions where two proces | |
ses are trying to set the same registry key. This will be updated in the near future to use 'RegNotifyChangeK | |
eyValue' which is exposed by the WinAPI and allows a process to register for notification on a registry key ch | |
ange.\n- :remove: removes a value from an existing registry key\n\n### Attribute Parameters\n\n- key_name: nam | |
e attribute. The registry key to create/modify.\n- values: hash of the values to set under the registry key. T | |
he individual hash items will become respective 'Value name' => 'Value data' items in the registry key.\n- typ | |
e: Type of key to create, currently only used for :binary to create `REG_BINARY` registry keys. Must be a symb | |
ol. See __Roadmap__ for future plans.\n\n### Examples\n\n # make the local windows proxy match the one set | |
for Chef\n proxy = URI.parse(Chef::Config[:http_proxy])\n windows_registry 'HKCU\\Software\\Microsoft\\W | |
indows\\CurrentVersion\\Internet Settings' do\n values 'ProxyEnable' => 1, 'ProxyServer' => \"\#{proxy.ho | |
st}:\#{proxy.port}\", 'ProxyOverride' => '<local>'\n end\n\n # enable Remote Desktop and poke the firewa | |
ll hole\n windows_registry 'HKLM\\SYSTEM\\CurrentControlSet\\Control\\Terminal Server' do\n values 'Fd | |
enyTSConnections' => 0\n end\n\n # Delete an item from the registry\n windows_registry 'HKCU\\Softwar | |
e\\Test' do\n #Key is the name of the value that you want to delete the value is always empty\n valu | |
es 'ValueToDelete' => ''\n action :remove\n end\n\n### Library Methods\n\n Registry.value_exists?(' | |
HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run','BGINFO')\n Registry.key_exists?('HKLM\\SOFTWARE\\ | |
Microsoft')\n BgInfo = Registry.get_value('HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run','BGINFO | |
')\n\n\nwindows\\_path\n-------------\n\n### Actions\n- :add: Add an item to the system path\n\n### Attribute | |
Parameters\n- :path: Name attribute. The name of the value to add to the system path\n\n### Examples\n\n #A | |
dd Sysinternals to the system path\n windows_path 'C:\\Sysinternals' do\n action :add\n end\n\n\nwi | |
ndows\\_zipfile\n----------------\n\nMost version of Windows do not ship with native cli utility for managing | |
compressed files. This resource provides a pure-ruby implementation for managing zip files. Be sure to use th | |
e `not_if` or `only_if` meta parameters to guard the resource for idempotence or action will be taken on the z | |
ip file every Chef run.\n\n### Actions\n\n- :unzip: unzip a compressed file\n\n### Attribute Parameters\n\n- p | |
ath: name attribute. The path where files will be unzipped to.\n- source: The source of the zip file. This can | |
either be a URI or a local path.\n- overwrite: force an overwrite of the files if the already exists.\n\n### | |
Examples\n\n # unzip a remote zip file locally\n windows_zipfile \"c:/bin\" do\n source \"http://do | |
wnload.sysinternals.com/Files/SysinternalsSuite.zip\"\n action :unzip\n not_if {::File.exists?(\"c:/ | |
bin/PsExec.exe\")}\n end\n\n # unzip a local zipfile\n windows_zipfile \"c:/the_codez\" do\n sou | |
rce \"c:/foo/baz/the_codez.zip\"\n action :unzip\n end\n\n\nException/Report Handlers\n=============== | |
==========\n\nWindowsRebootHandler\n--------------------\n\nRequired reboots are a necessary evil of configuri | |
ng and managing Windows nodes. This report handler (ie fires at the end of successful Chef runs) acts on requ | |
ested (Chef initiated) or pending (as determined by the OS per configuration action we performed) reboots. Th | |
e `allow_pending_reboots` initialization argument should be set to false if you do not want the handler to aut | |
omatically reboot a node if it has been determined a reboot is pending. Reboots can still be requested explic | |
itly via the `windows_reboot` LWRP.\n\n## Initialization Arguments\n\n- `allow_pending_reboots`: indicator on | |
whether the handler should act on a the Window's 'pending reboot' state. default is true\n- `timeout`: timeout | |
delay in seconds to wait before proceeding with the reboot. default is 60 seconds\n- `reason`: comment on th | |
e reason for the reboot. default is 'Opscode Chef initiated reboot'\n\nUsage\n=====\n\nJust place an explicit | |
dependency on this cookbook (using depends in the cookbook's metadata.rb) from any cookbook where you would li | |
ke to use the Windows-specific resources/providers that ship with this cookbook.\n\ndefault\n-------\n\nConven | |
ience recipe that installs supporting gems for many of the resources/providers that ship with this cookbook.\n | |
\nreboot\\_handler\n--------------\n\nLeverages the `chef_handler` LWRP to register the `WindowsRebootHandler` | |
report handler that ships as part of this cookbook. By default this handler is set to automatically act on pe | |
nding reboots. If you would like to change this behavior override `node['windows']['allow_pending_reboots']` | |
and set the value to false. For example:\n\n % cat roles/base.rb\n name \"base\"\n description \"bas | |
e role\"\n override_attributes(\n \"windows\" => {\n \"allow_pending_reboots\" => false\n | |
}\n )\n\nThis will still allow a reboot to be explicitly requested via the `windows_reboot` LWRP.\n\nChange | |
s/Roadmap\n===============\n\n## Future\n\n* package preseeding/response_file support\n* package installation | |
location via a `target_dir` attribute.\n* [COOK-666] `windows_package` should support CoApp packages\n* window | |
s_registry :force_modify action should use RegNotifyChangeKeyValue from WinAPI\n* WindowsRebootHandler/`window | |
s_reboot` LWRP should support kicking off subsequent chef run on reboot.\n* Support all types of registry keys | |
with `type` parameter in `windows_registry`.\n\n### v1.2.10\n\n* [COOK-939] - add `type` parameter to `window | |
s_registry` to allow binary registry keys.\n* [COOK-940] - refactor logic so multiple values get created.\n\n# | |
## v1.2.8\n\n* FIX: Older Windows (Windows Server 2003) sometimes return 127 on successful forked commands\n* | |
FIX: `windows_package`, ensure we pass the WOW* registry redirection flags into reg.open\n\n### v1.2.6\n\n* pa | |
tch to fix [CHEF-2684], Open4 is named Open3 in Ruby 1.9\n* Ruby 1.9's Open3 returns 0 and 42 for successful c | |
ommands\n* retry keyword can only be used in a rescue block in Ruby 1.9\n\n### v1.2.4\n\n* windows_package - c | |
atch Win32::Registry::Error that pops up when searching certain keys\n\n### v1.2.2\n\n* combined numerous help | |
er libarires for easier sharing across libaries/LWRPs\n* renamed Chef::Provider::WindowsFeature::Base file to | |
the more descriptive `feature_base.rb`\n* refactored windows_path LWRP\n * :add action should MODIFY the the | |
underlying ENV variable (vs CREATE)\n * deleted greedy :remove action until it could be made more idempotent\ | |
n* added a windows_batch resource/provider for running batch scripts remotely\n\n### v1.2.0\n\n* [COOK-745] gr | |
acefully handle required server restarts on Windows platform\n * WindowsRebootHandler for requested and pendi | |
ng reboots\n * windows_reboot LWRP for requesting (receiving notifies) reboots\n * reboot_handler recipe for | |
enabling WindowsRebootHandler as a report handler\n* [COOK-714] Correct initialize misspelling\n* RegistryHel | |
per - new `get_values` method which returns all values for a particular key.\n\n### v1.0.8\n\n* [COOK-719] res | |
ource/provider for managing windows features\n* [COOK-717] remove `windows_env_vars` resource as env resource | |
exists in core chef\n* new `Windows::Version` helper class\n* refactored `Windows::Helper` mixin\n\n### v1.0.6 | |
\n\n* added `force_modify` action to `windows_registry` resource\n* add `win_friendly_path` helper\n* re-purpo | |
se default recipe to install useful supporting windows related gems\n\n### v1.0.4\n\n* [COOK-700] new resource | |
s and improvements to the `windows_registry` provider (thanks Paul Morton!)\n * Open the registry in the bite | |
dnes of the OS\n * Provide convenience methods to check if keys and values exit\n * Provide convenience meth | |
od for reading registry values\n * NEW - `windows_auto_run` resource/provider\n * NEW - `windows_env_vars` r | |
esource/provider\n * NEW - `windows_path` resource/provider\n* re-write of the windows_package logic for dete | |
rmining current installed packages\n* new checksum attribute for windows_package resource...useful for remote | |
packages\n\n### v1.0.2:\n\n* [COOK-647] account for Wow6432Node registry redirecter\n* [COOK-656] begin/rescue | |
on win32/registry\n\n### 1.0.0:\n\n* [COOK-612] initial release\n\nLicense and Author\n==================\n\n | |
Author:: Seth Chisamore (<schisamo@opscode.com>)\nAuthor:: Doug MacEachern (<dougm@vmware.com>)\nAuthor:: Paul | |
Morton (<pmorton@biaprotect.com>)\n\nCopyright:: 2011, Opscode, Inc.\nCopyright:: 2010, VMware, Inc.\nCopyrig | |
ht:: 2011, Business Intelligence Associates, Inc\n\n\nLicensed under the Apache License, Version 2.0 (the \"Li | |
cense\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the Lice | |
nse at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\nUnless required by applicable law or agreed to in | |
writing, software\ndistributed under the License is distributed on an \"AS IS\" BASIS,\nWITHOUT WARRANTIES OR | |
CONDITIONS OF ANY KIND, either express or implied.\nSee the License for the specific language governing permis | |
sions and\nlimitations under the License.\n", @maintainer="Opscode, Inc.", @maintainer_email="cookbooks@opscod | |
e.com", @license="Apache 2.0", @description="Provides a set of useful Windows-specific primitives.", @platform | |
s={"windows"=>">= 0.0.0"}, @dependencies={"chef_handler"=>">= 0.0.0"}, @recommendations={}, @suggestions={}, @ | |
conflicting={}, @providing={"windows"=>">= 0.0.0", "windows::reboot_handler"=>">= 0.0.0"}, @replacing={}, @att | |
ributes={}, @groupings={}, @recipes={"windows"=>"", "windows::reboot_handler"=>""}, @version="1.2.10">, @check | |
sums={"f96479910ab96b5f06315c0ca0b302a4"=>nil, "5317f17e18e8edf0dbed3b67f2a0487d"=>nil, "c58c55315e2898eb773c1 | |
bde8d585709"=>nil, "8916c5b22a18c87947dff58b71b974af"=>nil, "b8472303b776c2322600a0751c815395"=>nil, "848bd700 | |
c257e846d1011bda420d54e8"=>nil, "53fe31b998dfd009d7b8f58fa2380c0c"=>nil, "60e1a5b1b17dfc60285fb28fcd3870be"=>n | |
il, "2c46e31754b7e949a5857e2957bbc255"=>nil, "f52bafb5e9ce97d2a7258445b6b56406"=>nil, "271dba97116e58581ea4c65 | |
0386dd8f3"=>nil, "e58459cdaff6ef1bafb9fae64dffcc86"=>nil, "7859415b67a1db7633695b1acc9704fd"=>nil, "6aca1c8d5a | |
8ad48c260e264f598e9bb4"=>nil, "4b487ea5f4b20a2b17c761badcc55cfa"=>nil, "706f2a6b16ed14193e45c3016a71a0c5"=>nil | |
, "aa71d112a4856c8aaf422c7e8503e971"=>nil, "b8f4746c0dc02ee922751006fa0b9c3f"=>nil, "a55d8ab514d9d9efae136a872 | |
711f80f"=>nil, "568fe3411d4a69f1c3c9b32780b24cf7"=>nil, "76f502ee18c89d7beb68e7f13ab0e9c0"=>nil, "cead86571eaa | |
50734abbcdfc608025fd"=>nil, "724ecf2579c182dff0f21a92b262256e"=>nil, "9b20966748f370b153659189191c3859"=>nil, | |
"6b1e4d953a821a36e60a3a434783a42b"=>nil, "eda001f275230230125ff1c8dbcd01af"=>nil, "79a76ab34126d1e28c62c4f070b | |
10dc9"=>nil, "d00cacbe68f1a7257ca40e0ae89293d7"=>nil, "fe5055d81afa103bc3e47692daa2aa9f"=>nil, "64a0f1e6dafcaa | |
4a5a5077a0dd07a430"=>nil}, @manifest_records_by_path={"resources/zipfile.rb"=>{"name"=>"zipfile.rb", "url"=>"h | |
ttps://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksu | |
m-f96479910ab96b5f06315c0ca0b302a4?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=Qq7hFcs2Yz | |
8CQRt8VCgDL6WYDjA%3D", "checksum"=>"f96479910ab96b5f06315c0ca0b302a4", "path"=>"resources/zipfile.rb", "specif | |
icity"=>"default"}, "resources/package.rb"=>{"name"=>"package.rb", "url"=>"https://s3.amazonaws.com/opscode-pl | |
atform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-5317f17e18e8edf0dbed3b67f2a0487d | |
?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=Kk9pUI3vtbQcttnkjn%2BcDb0j6zM%3D", "checksum | |
"=>"5317f17e18e8edf0dbed3b67f2a0487d", "path"=>"resources/package.rb", "specificity"=>"default"}, "resources/r | |
egistry.rb"=>{"name"=>"registry.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organiz | |
ation-5beb2e18f5854d1a90067d55bcbe98d8/checksum-c58c55315e2898eb773c1bde8d585709?AWSAccessKeyId=AKIAJOZTD2N26S | |
7W6APA&Expires=1329588248&Signature=3tQ0YT0Th%2Bntah8hm279FJGc800%3D", "checksum"=>"c58c55315e2898eb773c1bde8d | |
585709", "path"=>"resources/registry.rb", "specificity"=>"default"}, "resources/auto_run.rb"=>{"name"=>"auto_r | |
un.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d5 | |
5bcbe98d8/checksum-8916c5b22a18c87947dff58b71b974af?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Sig | |
nature=suXa1WlTvHI0o1TmCDhnkosQZI8%3D", "checksum"=>"8916c5b22a18c87947dff58b71b974af", "path"=>"resources/aut | |
o_run.rb", "specificity"=>"default"}, "resources/reboot.rb"=>{"name"=>"reboot.rb", "url"=>"https://s3.amazonaw | |
s.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-b8472303b776c232 | |
2600a0751c815395?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=%2Fci%2F%2B7kH0CLOaDIwtLpcSV | |
zQpWs%3D", "checksum"=>"b8472303b776c2322600a0751c815395", "path"=>"resources/reboot.rb", "specificity"=>"defa | |
ult"}, "resources/path.rb"=>{"name"=>"path.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-d | |
ata/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-848bd700c257e846d1011bda420d54e8?AWSAccessKeyId=AKI | |
AJOZTD2N26S7W6APA&Expires=1329588248&Signature=ds2sh%2B8O02e%2F73vdTzW8QwPTrzA%3D", "checksum"=>"848bd700c257e | |
846d1011bda420d54e8", "path"=>"resources/path.rb", "specificity"=>"default"}, "resources/batch.rb"=>{"name"=>" | |
batch.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a9006 | |
7d55bcbe98d8/checksum-53fe31b998dfd009d7b8f58fa2380c0c?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248& | |
Signature=7uziTu%2BWkHNxkHjWiqw54AXCSMs%3D", "checksum"=>"53fe31b998dfd009d7b8f58fa2380c0c", "path"=>"resource | |
s/batch.rb", "specificity"=>"default"}, "resources/feature.rb"=>{"name"=>"feature.rb", "url"=>"https://s3.amaz | |
onaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-60e1a5b1b17d | |
fc60285fb28fcd3870be?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=UAIlMzAJ%2Bgin%2Bgh9zd9h | |
AvPwgX0%3D", "checksum"=>"60e1a5b1b17dfc60285fb28fcd3870be", "path"=>"resources/feature.rb", "specificity"=>"d | |
efault"}, "providers/registry.rb"=>{"name"=>"registry.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-p | |
roduction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-2c46e31754b7e949a5857e2957bbc255?AWSAcce | |
ssKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=DqYKUVvu%2FlJBgqSDgXV%2B5I0LL2Q%3D", "checksum"=>"2c | |
46e31754b7e949a5857e2957bbc255", "path"=>"providers/registry.rb", "specificity"=>"default"}, "providers/auto_r | |
un.rb"=>{"name"=>"auto_run.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization | |
-5beb2e18f5854d1a90067d55bcbe98d8/checksum-f52bafb5e9ce97d2a7258445b6b56406?AWSAccessKeyId=AKIAJOZTD2N26S7W6AP | |
A&Expires=1329588248&Signature=a1l8JU0thZ%2BzJSOPi5KjODH5HUU%3D", "checksum"=>"f52bafb5e9ce97d2a7258445b6b5640 | |
6", "path"=>"providers/auto_run.rb", "specificity"=>"default"}, "providers/path.rb"=>{"name"=>"path.rb", "url" | |
=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/che | |
cksum-271dba97116e58581ea4c650386dd8f3?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=PnG8iJ | |
NzgPFoOWGHrfZrUreMHLo%3D", "checksum"=>"271dba97116e58581ea4c650386dd8f3", "path"=>"providers/path.rb", "speci | |
ficity"=>"default"}, "providers/feature_servermanagercmd.rb"=>{"name"=>"feature_servermanagercmd.rb", "url"=>" | |
https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checks | |
um-e58459cdaff6ef1bafb9fae64dffcc86?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=etgh%2B0p | |
tFnOwNfiW9sFopDqN7a4%3D", "checksum"=>"e58459cdaff6ef1bafb9fae64dffcc86", "path"=>"providers/feature_serverman | |
agercmd.rb", "specificity"=>"default"}, "providers/zipfile.rb"=>{"name"=>"zipfile.rb", "url"=>"https://s3.amaz | |
onaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-7859415b67a1 | |
db7633695b1acc9704fd?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=jkzyZ0b33AWcOr1t5r8ERcVm | |
Bg8%3D", "checksum"=>"7859415b67a1db7633695b1acc9704fd", "path"=>"providers/zipfile.rb", "specificity"=>"defau | |
lt"}, "providers/package.rb"=>{"name"=>"package.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-product | |
ion-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-6aca1c8d5a8ad48c260e264f598e9bb4?AWSAccessKeyI | |
d=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=EDnAPMUn1Ox88EY7Q4VB0Ll55W8%3D", "checksum"=>"6aca1c8d5a8a | |
d48c260e264f598e9bb4", "path"=>"providers/package.rb", "specificity"=>"default"}, "providers/batch.rb"=>{"name | |
"=>"batch.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a | |
90067d55bcbe98d8/checksum-4b487ea5f4b20a2b17c761badcc55cfa?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588 | |
248&Signature=1rKmNBsU%2FB50BxYzobpAIQYXBAQ%3D", "checksum"=>"4b487ea5f4b20a2b17c761badcc55cfa", "path"=>"prov | |
iders/batch.rb", "specificity"=>"default"}, "providers/feature_dism.rb"=>{"name"=>"feature_dism.rb", "url"=>"h | |
ttps://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksu | |
m-706f2a6b16ed14193e45c3016a71a0c5?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=NYNHRzg20o | |
tEnu9PqfCRYrz96DE%3D", "checksum"=>"706f2a6b16ed14193e45c3016a71a0c5", "path"=>"providers/feature_dism.rb", "s | |
pecificity"=>"default"}, "providers/reboot.rb"=>{"name"=>"reboot.rb", "url"=>"https://s3.amazonaws.com/opscode | |
-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-aa71d112a4856c8aaf422c7e8503e | |
971?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=RyoSysJRgZ3kD3VRmpFo0XhifJ4%3D", "checksu | |
m"=>"aa71d112a4856c8aaf422c7e8503e971", "path"=>"providers/reboot.rb", "specificity"=>"default"}, "recipes/def | |
ault.rb"=>{"name"=>"default.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organizatio | |
n-5beb2e18f5854d1a90067d55bcbe98d8/checksum-b8f4746c0dc02ee922751006fa0b9c3f?AWSAccessKeyId=AKIAJOZTD2N26S7W6A | |
PA&Expires=1329588248&Signature=KedGzMRkiQl%2B06ul%2BNZG6X%2BgdvA%3D", "checksum"=>"b8f4746c0dc02ee922751006fa | |
0b9c3f", "path"=>"recipes/default.rb", "specificity"=>"default"}, "recipes/reboot_handler.rb"=>{"name"=>"reboo | |
t_handler.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a | |
90067d55bcbe98d8/checksum-a55d8ab514d9d9efae136a872711f80f?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588 | |
248&Signature=mIziC4oaEAS3MdlZ4EHUQMdjOH4%3D", "checksum"=>"a55d8ab514d9d9efae136a872711f80f", "path"=>"recipe | |
s/reboot_handler.rb", "specificity"=>"default"}, "libraries/feature_base.rb"=>{"name"=>"feature_base.rb", "url | |
"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/ch | |
ecksum-568fe3411d4a69f1c3c9b32780b24cf7?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=qFm%2 | |
BeREpTVIBnSFK%2BDKjWfmLpPQ%3D", "checksum"=>"568fe3411d4a69f1c3c9b32780b24cf7", "path"=>"libraries/feature_bas | |
e.rb", "specificity"=>"default"}, "libraries/registry_helper.rb"=>{"name"=>"registry_helper.rb", "url"=>"https | |
://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-76 | |
f502ee18c89d7beb68e7f13ab0e9c0?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=7eiaV4gS4XGC8e | |
46twRX7fNUgIc%3D", "checksum"=>"76f502ee18c89d7beb68e7f13ab0e9c0", "path"=>"libraries/registry_helper.rb", "sp | |
ecificity"=>"default"}, "libraries/helper.rb"=>{"name"=>"helper.rb", "url"=>"https://s3.amazonaws.com/opscode- | |
platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-cead86571eaa50734abbcdfc608025 | |
fd?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=nqwmQDawggxfeZRUVxC7Or14nNw%3D", "checksum | |
"=>"cead86571eaa50734abbcdfc608025fd", "path"=>"libraries/helper.rb", "specificity"=>"default"}, "libraries/wi | |
ndows_privileged.rb"=>{"name"=>"windows_privileged.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-prod | |
uction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-724ecf2579c182dff0f21a92b262256e?AWSAccessK | |
eyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=nDsYVKjkkl2E%2FrXJSv4vjWjneGY%3D", "checksum"=>"724ecf2 | |
579c182dff0f21a92b262256e", "path"=>"libraries/windows_privileged.rb", "specificity"=>"default"}, "libraries/v | |
ersion.rb"=>{"name"=>"version.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organizat | |
ion-5beb2e18f5854d1a90067d55bcbe98d8/checksum-9b20966748f370b153659189191c3859?AWSAccessKeyId=AKIAJOZTD2N26S7W | |
6APA&Expires=1329588248&Signature=mpkkFFnwcaYqQwHOZA2AwP30OZc%3D", "checksum"=>"9b20966748f370b153659189191c38 | |
59", "path"=>"libraries/version.rb", "specificity"=>"default"}, "libraries/ruby_19_patches.rb"=>{"name"=>"ruby | |
_19_patches.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d | |
1a90067d55bcbe98d8/checksum-6b1e4d953a821a36e60a3a434783a42b?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=13295 | |
88248&Signature=G9RyT4s5spgs4NKsCz36NmjLsSM%3D", "checksum"=>"6b1e4d953a821a36e60a3a434783a42b", "path"=>"libr | |
aries/ruby_19_patches.rb", "specificity"=>"default"}, "attributes/default.rb"=>{"name"=>"default.rb", "url"=>" | |
https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checks | |
um-eda001f275230230125ff1c8dbcd01af?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=Dk%2BTtSA | |
2bjxDl0sVU4zJUrZnfpE%3D", "checksum"=>"eda001f275230230125ff1c8dbcd01af", "path"=>"attributes/default.rb", "sp | |
ecificity"=>"default"}, "files/default/handlers/windows_reboot_handler.rb"=>{"name"=>"handlers/windows_reboot_ | |
handler.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90 | |
067d55bcbe98d8/checksum-79a76ab34126d1e28c62c4f070b10dc9?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=132958824 | |
8&Signature=Pzy4Mt%2FQiuUuWp1prLr0o8jpgGQ%3D", "checksum"=>"79a76ab34126d1e28c62c4f070b10dc9", "path"=>"files/ | |
default/handlers/windows_reboot_handler.rb", "specificity"=>"default"}, "README.md"=>{"name"=>"README.md", "ur | |
l"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/c | |
hecksum-d00cacbe68f1a7257ca40e0ae89293d7?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=jNiE | |
bHYq4b%2BVzm6FDiD8n1H7OnU%3D", "checksum"=>"d00cacbe68f1a7257ca40e0ae89293d7", "path"=>"README.md", "specifici | |
ty"=>"default"}, "metadata.rb"=>{"name"=>"metadata.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-prod | |
uction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-fe5055d81afa103bc3e47692daa2aa9f?AWSAccessK | |
eyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=6ZJpwHTTJA0R1E6mAls9%2Bb2%2Fw7s%3D", "checksum"=>"fe505 | |
5d81afa103bc3e47692daa2aa9f", "path"=>"metadata.rb", "specificity"=>"default"}, "metadata.json"=>{"name"=>"met | |
adata.json", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90 | |
067d55bcbe98d8/checksum-64a0f1e6dafcaa4a5a5077a0dd07a430?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=132958824 | |
8&Signature=%2F910xraF%2FCEOqCZ%2FnNdIsLvNTUU%3D", "checksum"=>"64a0f1e6dafcaa4a5a5077a0dd07a430", "path"=>"me | |
tadata.json", "specificity"=>"default"}}, @attribute_filenames_by_short_filename={"default"=>"default.rb"}>, " | |
openssl"=>#<Chef::CookbookVersion:0x2cea0e8 @name="openssl", @frozen=false, @attribute_filenames=[], @definiti | |
on_filenames=[], @template_filenames=[], @file_filenames=[], @recipe_filenames=["default.rb"], @recipe_filenam | |
es_by_name={"default"=>"default.rb"}, @library_filenames=["secure_password.rb"], @resource_filenames=[], @prov | |
ider_filenames=[], @metadata_filenames=[], @root_dir=nil, @root_filenames=["README.md", "metadata.rb", "metada | |
ta.json"], @couchdb_id=nil, @couchdb=#<Chef::CouchDB:0x2ce9ba8 @db="chef", @rest=#<Chef::REST:0x2ce9b48 @url=" | |
http://localhost:5984", @cookies={}, @default_headers={}, @auth_credentials=#<Chef::REST::AuthCredentials:0x2c | |
e9908 @key_file=nil, @client_name=nil>, @sign_request=true, @sign_on_redirect=true, @redirects_followed=0, @re | |
direct_limit=10>>, @couchdb_rev=nil, @status=:ready, @manifest={"name"=>"openssl-1.0.0", "definitions"=>[], "j | |
son_class"=>"Chef::CookbookVersion", "files"=>[], "attributes"=>[], "metadata"=>{"name"=>"openssl", "descripti | |
on"=>"Provides a library with a method for generating secure random passwords.", "long_description"=>"Descript | |
ion\n====\n\nProvide a library method to generate secure random passwords in recipes.\n\nRequirements\n====\n\ | |
nWorks on any platform with OpenSSL Ruby bindings installed, which are a requirement for Chef anyway.\n\nUsage | |
\n====\n\nMost often this will be used to generate a secure password for an attribute.\n\n include Opscode: | |
:OpenSSL::Password\n\n set_unless[:my_password] = secure_password\n\nLicense and Author\n====\n\nAuthor:: J | |
oshua Timberman (<joshua@opscode.com>)\n\nCopyright:: 2009-2011, Opscode, Inc\n\nLicensed under the Apache Lic | |
ense, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou ma | |
y obtain a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\nUnless required by appl | |
icable law or agreed to in writing, software\ndistributed under the License is distributed on an \"AS IS\" BAS | |
IS,\nWITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\nSee the License for the specifi | |
c language governing permissions and\nlimitations under the License.\n", "maintainer"=>"Opscode, Inc.", "maint | |
ainer_email"=>"cookbooks@opscode.com", "license"=>"Apache 2.0", "platforms"=>{}, "dependencies"=>{}, "recommen | |
dations"=>{}, "suggestions"=>{}, "conflicting"=>{}, "providing"=>{"openssl"=>">= 0.0.0"}, "replacing"=>{}, "at | |
tributes"=>{}, "groupings"=>{}, "recipes"=>{"openssl"=>""}, "version"=>"1.0.0"}, "providers"=>[], "cookbook_na | |
me"=>"openssl", "templates"=>[], "libraries"=>[{"name"=>"secure_password.rb", "url"=>"https://s3.amazonaws.com | |
/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-b3bf8b34c97e21c5ee6aa | |
0ddb11b133e?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=map9KKI5wHL9jvqUiLeF0%2FIewUs%3D" | |
, "checksum"=>"b3bf8b34c97e21c5ee6aa0ddb11b133e", "path"=>"libraries/secure_password.rb", "specificity"=>"defa | |
ult"}], "resources"=>[], "version"=>"1.0.0", "recipes"=>[{"name"=>"default.rb", "url"=>"https://s3.amazonaws.c | |
om/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-cd9b688975824954297 | |
838f7d4214b7f?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=C33j%2BGfpAdRYwpWWJ%2FpB2S8VSwc | |
%3D", "checksum"=>"cd9b688975824954297838f7d4214b7f", "path"=>"recipes/default.rb", "specificity"=>"default"}] | |
, "root_files"=>[{"name"=>"README.md", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organ | |
ization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-f111ba97dc5160e26eee6473dc8e86d5?AWSAccessKeyId=AKIAJOZTD2N2 | |
6S7W6APA&Expires=1329588248&Signature=qzmQ6CGatqTiyMwp9ylb6EozJSE%3D", "checksum"=>"f111ba97dc5160e26eee6473dc | |
8e86d5", "path"=>"README.md", "specificity"=>"default"}, {"name"=>"metadata.rb", "url"=>"https://s3.amazonaws. | |
com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-aa56fc9900227fdc83 | |
b25654ee316593?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=AJDc7zGpUgfdi9n0YjZn4w6Borw%3D | |
", "checksum"=>"aa56fc9900227fdc83b25654ee316593", "path"=>"metadata.rb", "specificity"=>"default"}, {"name"=> | |
"metadata.json", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d | |
1a90067d55bcbe98d8/checksum-952c568d3a52988f8610f62fcfc0397e?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=13295 | |
88248&Signature=CeOqhhVDZdVunUq6XtMdVM07p7M%3D", "checksum"=>"952c568d3a52988f8610f62fcfc0397e", "path"=>"meta | |
data.json", "specificity"=>"default"}], "frozen?"=>false, "chef_type"=>"cookbook_version"}, @file_vendor=nil, | |
@metadata=#<Chef::Cookbook::Metadata:0x2cb6008 @cookbook=nil, @name="openssl", @long_description="Description\ | |
n====\n\nProvide a library method to generate secure random passwords in recipes.\n\nRequirements\n====\n\nWor | |
ks on any platform with OpenSSL Ruby bindings installed, which are a requirement for Chef anyway.\n\nUsage\n== | |
==\n\nMost often this will be used to generate a secure password for an attribute.\n\n include Opscode::Ope | |
nSSL::Password\n\n set_unless[:my_password] = secure_password\n\nLicense and Author\n====\n\nAuthor:: Joshu | |
a Timberman (<joshua@opscode.com>)\n\nCopyright:: 2009-2011, Opscode, Inc\n\nLicensed under the Apache License | |
, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may ob | |
tain a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\nUnless required by applicab | |
le law or agreed to in writing, software\ndistributed under the License is distributed on an \"AS IS\" BASIS,\ | |
nWITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\nSee the License for the specific la | |
nguage governing permissions and\nlimitations under the License.\n", @maintainer="Opscode, Inc.", @maintainer_ | |
email="cookbooks@opscode.com", @license="Apache 2.0", @description="Provides a library with a method for gener | |
ating secure random passwords.", @platforms={}, @dependencies={}, @recommendations={}, @suggestions={}, @confl | |
icting={}, @providing={"openssl"=>">= 0.0.0"}, @replacing={}, @attributes={}, @groupings={}, @recipes={"openss | |
l"=>""}, @version="1.0.0">, @checksums={"cd9b688975824954297838f7d4214b7f"=>nil, "b3bf8b34c97e21c5ee6aa0ddb11b | |
133e"=>nil, "f111ba97dc5160e26eee6473dc8e86d5"=>nil, "aa56fc9900227fdc83b25654ee316593"=>nil, "952c568d3a52988 | |
f8610f62fcfc0397e"=>nil}, @manifest_records_by_path={"recipes/default.rb"=>{"name"=>"default.rb", "url"=>"http | |
s://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-c | |
d9b688975824954297838f7d4214b7f?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=C33j%2BGfpAdR | |
YwpWWJ%2FpB2S8VSwc%3D", "checksum"=>"cd9b688975824954297838f7d4214b7f", "path"=>"recipes/default.rb", "specifi | |
city"=>"default"}, "libraries/secure_password.rb"=>{"name"=>"secure_password.rb", "url"=>"https://s3.amazonaws | |
.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-b3bf8b34c97e21c5e | |
e6aa0ddb11b133e?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=map9KKI5wHL9jvqUiLeF0%2FIewUs | |
%3D", "checksum"=>"b3bf8b34c97e21c5ee6aa0ddb11b133e", "path"=>"libraries/secure_password.rb", "specificity"=>" | |
default"}, "README.md"=>{"name"=>"README.md", "url"=>"https://s3.amazonaws.com/opscode-platform-production-dat | |
a/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-f111ba97dc5160e26eee6473dc8e86d5?AWSAccessKeyId=AKIAJ | |
OZTD2N26S7W6APA&Expires=1329588248&Signature=qzmQ6CGatqTiyMwp9ylb6EozJSE%3D", "checksum"=>"f111ba97dc5160e26ee | |
e6473dc8e86d5", "path"=>"README.md", "specificity"=>"default"}, "metadata.rb"=>{"name"=>"metadata.rb", "url"=> | |
"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/check | |
sum-aa56fc9900227fdc83b25654ee316593?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=AJDc7zGp | |
Ugfdi9n0YjZn4w6Borw%3D", "checksum"=>"aa56fc9900227fdc83b25654ee316593", "path"=>"metadata.rb", "specificity"= | |
>"default"}, "metadata.json"=>{"name"=>"metadata.json", "url"=>"https://s3.amazonaws.com/opscode-platform-prod | |
uction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-952c568d3a52988f8610f62fcfc0397e?AWSAccessK | |
eyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=CeOqhhVDZdVunUq6XtMdVM07p7M%3D", "checksum"=>"952c568d3 | |
a52988f8610f62fcfc0397e", "path"=>"metadata.json", "specificity"=>"default"}}, @attribute_filenames_by_short_f | |
ilename={}>, "chef_handler"=>#<Chef::CookbookVersion:0x2c64228 @name="chef_handler", @frozen=false, @attribute | |
_filenames=["default.rb"], @definition_filenames=[], @template_filenames=[], @file_filenames=["handlers/README | |
"], @recipe_filenames=["default.rb", "json_file.rb"], @recipe_filenames_by_name={"default"=>"default.rb", "jso | |
n_file"=>"json_file.rb"}, @library_filenames=[], @resource_filenames=["default.rb"], @provider_filenames=["def | |
ault.rb"], @metadata_filenames=[], @root_dir=nil, @root_filenames=["README.md", "metadata.rb", "metadata.json" | |
], @couchdb_id=nil, @couchdb=#<Chef::CouchDB:0x2c63df0 @db="chef", @rest=#<Chef::REST:0x2c63dd8 @url="http://l | |
ocalhost:5984", @cookies={}, @default_headers={}, @auth_credentials=#<Chef::REST::AuthCredentials:0x2c63c58 @k | |
ey_file=nil, @client_name=nil>, @sign_request=true, @sign_on_redirect=true, @redirects_followed=0, @redirect_l | |
imit=10>>, @couchdb_rev=nil, @status=:ready, @manifest={"definitions"=>[], "name"=>"chef_handler-1.0.4", "file | |
s"=>[{"name"=>"handlers/README", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organizatio | |
n-5beb2e18f5854d1a90067d55bcbe98d8/checksum-1976d7bafb98f6be15781023e134d943?AWSAccessKeyId=AKIAJOZTD2N26S7W6A | |
PA&Expires=1329588248&Signature=3uArc9jAFTi4LzQFSN93fpgZmTM%3D", "checksum"=>"1976d7bafb98f6be15781023e134d943 | |
", "path"=>"files/default/handlers/README", "specificity"=>"default"}], "attributes"=>[{"name"=>"default.rb", | |
"url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d | |
8/checksum-710010283d3560b512263d52f8271aa3?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=G | |
XU8I9HXG9SE02Gm7T5nYg%2FYzjE%3D", "checksum"=>"710010283d3560b512263d52f8271aa3", "path"=>"attributes/default. | |
rb", "specificity"=>"default"}], "json_class"=>"Chef::CookbookVersion", "providers"=>[{"name"=>"default.rb", " | |
url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8 | |
/checksum-1af403317a8ccf8a6c4f325bcc7e4e04?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=pw | |
UVF9kPSR9PuW0actRYuPgZJuY%3D", "checksum"=>"1af403317a8ccf8a6c4f325bcc7e4e04", "path"=>"providers/default.rb", | |
"specificity"=>"default"}], "metadata"=>{"name"=>"chef_handler", "description"=>"Distribute and enable Chef E | |
xception and Report handlers", "long_description"=>"Description\n===========\n\nCreates a configured handler p | |
ath for distributing [Chef report and exception handlers](http://wiki.opscode.com/display/chef/Exception+and+R | |
eport+Handlers). Also exposes an LWRP for enabling Chef handlers from within recipe code (as opposed to hard | |
coding in the client.rb file). This is useful for cookbook authors who may want to ship a product specific ha | |
ndler (see the `cloudkick` cookbook for an example) with their cookbook.\n\nAttributes\n==========\n\n`node[\" | |
chef_handler\"][\"handler_path\"]` - location to drop off handlers directory, default is `/var/chef/handlers`. | |
\n\nResource/Provider\n=================\n\n`chef_handler`\n--------------\n\nRequires, configures and enables | |
handlers on the node for the current Chef run. Also has the ability to pass arguments to the handlers initia | |
lizer. This allows initialization data to be pulled from a node's attribute data.\n\nIt is best to declare `c | |
hef_handler` resources early on in the compile phase so they are available to fire for any exceptions during t | |
he Chef run. If you have a base role you would want any recipes that register Chef handlers to come first in | |
the run_list.\n\n### Actions\n\n- :enable: Enables the Chef handler for the current Chef run on the current no | |
de\n- :disable: Disables the Chef handler for the current Chef run on the current node\n\n### Attribute Parame | |
ters\n\n- class_name: name attribute. The name of the handler class (can be module name-spaced).\n- source: fu | |
ll path to the handler file. can also be a gem path if the handler ships as part of a Ruby gem.\n- arguments: | |
an array of arguments to pass the handler's class initializer\n- supports: type of Chef Handler to register a | |
s, ie :report, :exception or both. default is `:report => true, :exception => true`\n\n### Example\n \n | |
# register the Chef::Handler::JsonFile handler \n # that ships with the Chef gem\n chef_handler \"Chef:: | |
Handler::JsonFile\" do\n source \"chef/handler/json_file\"\n arguments :path => '/var/chef/reports'\ | |
n action :enable\n end\n \n # do the same but during the compile phase\n chef_handler \"Chef: | |
:Handler::JsonFile\" do\n source \"chef/handler/json_file\"\n arguments :path => '/var/chef/reports' | |
\n action :nothing\n end.run_action(:enable)\n \n # handle exceptions only\n chef_handler \"C | |
hef::Handler::JsonFile\" do\n source \"chef/handler/json_file\"\n arguments :path => '/var/chef/repo | |
rts'\n supports exception => true\n action :enable\n end\n \n \n # enable the CloudkickH | |
andler which was \n # dropped off in the default handler path.\n # passes the oauth key/secret to the ha | |
ndler's \n # intializer.\n chef_handler \"CloudkickHandler\" do\n source \"\#{node['chef_handler'][ | |
'handler_path']}/cloudkick_handler.rb\"\n arguments [node['cloudkick']['oauth_key'], node['cloudkick']['o | |
auth_secret']]\n action :enable\n end\n\n\nUsage\n=====\n\ndefault\n-------\n\nPut the recipe `chef_ha | |
ndler` at the start of the node's run list to make sure that custom handlers are dropped off early on in the C | |
hef run and available for later recipes.\n\nFor information on how to write report and exception handlers for | |
Chef, please see the Chef wiki pages:\nhttp://wiki.opscode.com/display/chef/Exception+and+Report+Handlers\n\nj | |
son_file\n---------\n\nLeverages the `chef_handler` LWRP to automatically register the `Chef::Handler::JsonFil | |
e` handler that ships as part of Chef. This handler serializes the run status data to a JSON file located at ` | |
/var/chef/reports`.\n\nChanges/Roadmap\n===============\n\n## 1.0.4\n\n* [COOK-654] dont try and access a clas | |
s before it has been loaded\n* fix bad boolean check (if vs unless)\n\n## 1.0.2:\n\n* [COOK-620] ensure handle | |
r code is reloaded during daemonized chef runs\n\nLicense and Author\n==================\n\nAuthor:: Seth Chis | |
amore (<schisamo@opscode.com>)\n\nCopyright:: 2011, Opscode, Inc\n\nLicensed under the Apache License, Version | |
2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a co | |
py of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\nUnless required by applicable law or | |
agreed to in writing, software\ndistributed under the License is distributed on an \"AS IS\" BASIS,\nWITHOUT | |
WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\nSee the License for the specific language go | |
verning permissions and\nlimitations under the License.\n", "maintainer"=>"Opscode, Inc.", "maintainer_email"= | |
>"cookbooks@opscode.com", "license"=>"Apache 2.0", "platforms"=>{}, "dependencies"=>{}, "recommendations"=>{}, | |
"suggestions"=>{}, "conflicting"=>{}, "providing"=>{"chef_handler"=>">= 0.0.0", "chef_handler::json_file"=>"> | |
= 0.0.0"}, "replacing"=>{}, "attributes"=>{}, "groupings"=>{}, "recipes"=>{"chef_handler"=>"", "chef_handler:: | |
json_file"=>""}, "version"=>"1.0.4"}, "templates"=>[], "resources"=>[{"name"=>"default.rb", "url"=>"https://s3 | |
.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-64fd351 | |
46bb4042839800decca808b97?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=uOT4JfToaKkO0%2BwRe | |
0%2BV8OuRZLA%3D", "checksum"=>"64fd35146bb4042839800decca808b97", "path"=>"resources/default.rb", "specificity | |
"=>"default"}], "libraries"=>[], "cookbook_name"=>"chef_handler", "version"=>"1.0.4", "recipes"=>[{"name"=>"de | |
fault.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a9006 | |
7d55bcbe98d8/checksum-b301b2d18594a1e9cc552e2e85a9be96?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248& | |
Signature=jpA%2FLCHxIA6klDnFJYd21LmKhJo%3D", "checksum"=>"b301b2d18594a1e9cc552e2e85a9be96", "path"=>"recipes/ | |
default.rb", "specificity"=>"default"}, {"name"=>"json_file.rb", "url"=>"https://s3.amazonaws.com/opscode-plat | |
form-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-db05ae653e0fedf3c9747fad170612df?A | |
WSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=JQ4CYRqGsnAXn3oYFl6y8zj%2B7Pc%3D", "checksum"= | |
>"db05ae653e0fedf3c9747fad170612df", "path"=>"recipes/json_file.rb", "specificity"=>"default"}], "root_files"= | |
>[{"name"=>"README.md", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e1 | |
8f5854d1a90067d55bcbe98d8/checksum-e82549ca7a038fa004b8a06b12a13611?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expire | |
s=1329588248&Signature=JE8tRgjz8LezYIB%2Fj%2FahFtZ3anI%3D", "checksum"=>"e82549ca7a038fa004b8a06b12a13611", "p | |
ath"=>"README.md", "specificity"=>"default"}, {"name"=>"metadata.rb", "url"=>"https://s3.amazonaws.com/opscode | |
-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-26ee3eb9b3adceb6e46f344c6618a | |
169?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=7f3JoCN3ezOPuoZ5U5QOUKExv%2FU%3D", "check | |
sum"=>"26ee3eb9b3adceb6e46f344c6618a169", "path"=>"metadata.rb", "specificity"=>"default"}, {"name"=>"metadata | |
.json", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d5 | |
5bcbe98d8/checksum-1abcd0bf107234191c48b4121002aab5?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Sig | |
nature=2PvrKHR%2FudYDyoAz15QFK6RmsMw%3D", "checksum"=>"1abcd0bf107234191c48b4121002aab5", "path"=>"metadata.js | |
on", "specificity"=>"default"}], "frozen?"=>false, "chef_type"=>"cookbook_version"}, @file_vendor=nil, @metada | |
ta=#<Chef::Cookbook::Metadata:0x2c613a8 @cookbook=nil, @name="chef_handler", @long_description="Description\n= | |
==========\n\nCreates a configured handler path for distributing [Chef report and exception handlers](http://w | |
iki.opscode.com/display/chef/Exception+and+Report+Handlers). Also exposes an LWRP for enabling Chef handlers | |
from within recipe code (as opposed to hard coding in the client.rb file). This is useful for cookbook author | |
s who may want to ship a product specific handler (see the `cloudkick` cookbook for an example) with their coo | |
kbook.\n\nAttributes\n==========\n\n`node[\"chef_handler\"][\"handler_path\"]` - location to drop off handlers | |
directory, default is `/var/chef/handlers`.\n\nResource/Provider\n=================\n\n`chef_handler`\n------ | |
--------\n\nRequires, configures and enables handlers on the node for the current Chef run. Also has the abil | |
ity to pass arguments to the handlers initializer. This allows initialization data to be pulled from a node's | |
attribute data.\n\nIt is best to declare `chef_handler` resources early on in the compile phase so they are a | |
vailable to fire for any exceptions during the Chef run. If you have a base role you would want any recipes t | |
hat register Chef handlers to come first in the run_list.\n\n### Actions\n\n- :enable: Enables the Chef handle | |
r for the current Chef run on the current node\n- :disable: Disables the Chef handler for the current Chef run | |
on the current node\n\n### Attribute Parameters\n\n- class_name: name attribute. The name of the handler clas | |
s (can be module name-spaced).\n- source: full path to the handler file. can also be a gem path if the handle | |
r ships as part of a Ruby gem.\n- arguments: an array of arguments to pass the handler's class initializer\n- | |
supports: type of Chef Handler to register as, ie :report, :exception or both. default is `:report => true, :e | |
xception => true`\n\n### Example\n \n # register the Chef::Handler::JsonFile handler \n # that ships | |
with the Chef gem\n chef_handler \"Chef::Handler::JsonFile\" do\n source \"chef/handler/json_file\"\n | |
arguments :path => '/var/chef/reports'\n action :enable\n end\n \n # do the same but during | |
the compile phase\n chef_handler \"Chef::Handler::JsonFile\" do\n source \"chef/handler/json_file\"\n | |
arguments :path => '/var/chef/reports'\n action :nothing\n end.run_action(:enable)\n \n # | |
handle exceptions only\n chef_handler \"Chef::Handler::JsonFile\" do\n source \"chef/handler/json_file | |
\"\n arguments :path => '/var/chef/reports'\n supports exception => true\n action :enable\n | |
end\n \n \n # enable the CloudkickHandler which was \n # dropped off in the default handler path.\ | |
n # passes the oauth key/secret to the handler's \n # intializer.\n chef_handler \"CloudkickHandler\" | |
do\n source \"\#{node['chef_handler']['handler_path']}/cloudkick_handler.rb\"\n arguments [node['cl | |
oudkick']['oauth_key'], node['cloudkick']['oauth_secret']]\n action :enable\n end\n\n\nUsage\n=====\n\ | |
ndefault\n-------\n\nPut the recipe `chef_handler` at the start of the node's run list to make sure that custo | |
m handlers are dropped off early on in the Chef run and available for later recipes.\n\nFor information on how | |
to write report and exception handlers for Chef, please see the Chef wiki pages:\nhttp://wiki.opscode.com/dis | |
play/chef/Exception+and+Report+Handlers\n\njson_file\n---------\n\nLeverages the `chef_handler` LWRP to automa | |
tically register the `Chef::Handler::JsonFile` handler that ships as part of Chef. This handler serializes the | |
run status data to a JSON file located at `/var/chef/reports`.\n\nChanges/Roadmap\n===============\n\n## 1.0. | |
4\n\n* [COOK-654] dont try and access a class before it has been loaded\n* fix bad boolean check (if vs unless | |
)\n\n## 1.0.2:\n\n* [COOK-620] ensure handler code is reloaded during daemonized chef runs\n\nLicense and Auth | |
or\n==================\n\nAuthor:: Seth Chisamore (<schisamo@opscode.com>)\n\nCopyright:: 2011, Opscode, Inc\n | |
\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compl | |
iance with the License.\nYou may obtain a copy of the License at\n\n http://www.apache.org/licenses/LICENSE | |
-2.0\n\nUnless required by applicable law or agreed to in writing, software\ndistributed under the License is | |
distributed on an \"AS IS\" BASIS,\nWITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n | |
See the License for the specific language governing permissions and\nlimitations under the License.\n", @maint | |
ainer="Opscode, Inc.", @maintainer_email="cookbooks@opscode.com", @license="Apache 2.0", @description="Distrib | |
ute and enable Chef Exception and Report handlers", @platforms={}, @dependencies={}, @recommendations={}, @sug | |
gestions={}, @conflicting={}, @providing={"chef_handler"=>">= 0.0.0", "chef_handler::json_file"=>">= 0.0.0"}, | |
@replacing={}, @attributes={}, @groupings={}, @recipes={"chef_handler"=>"", "chef_handler::json_file"=>""}, @v | |
ersion="1.0.4">, @checksums={"64fd35146bb4042839800decca808b97"=>nil, "1af403317a8ccf8a6c4f325bcc7e4e04"=>nil, | |
"b301b2d18594a1e9cc552e2e85a9be96"=>nil, "db05ae653e0fedf3c9747fad170612df"=>nil, "710010283d3560b512263d52f8 | |
271aa3"=>nil, "1976d7bafb98f6be15781023e134d943"=>nil, "e82549ca7a038fa004b8a06b12a13611"=>nil, "26ee3eb9b3adc | |
eb6e46f344c6618a169"=>nil, "1abcd0bf107234191c48b4121002aab5"=>nil}, @manifest_records_by_path={"resources/def | |
ault.rb"=>{"name"=>"default.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organizatio | |
n-5beb2e18f5854d1a90067d55bcbe98d8/checksum-64fd35146bb4042839800decca808b97?AWSAccessKeyId=AKIAJOZTD2N26S7W6A | |
PA&Expires=1329588248&Signature=uOT4JfToaKkO0%2BwRe0%2BV8OuRZLA%3D", "checksum"=>"64fd35146bb4042839800decca80 | |
8b97", "path"=>"resources/default.rb", "specificity"=>"default"}, "providers/default.rb"=>{"name"=>"default.rb | |
", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe | |
98d8/checksum-1af403317a8ccf8a6c4f325bcc7e4e04?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signatur | |
e=pwUVF9kPSR9PuW0actRYuPgZJuY%3D", "checksum"=>"1af403317a8ccf8a6c4f325bcc7e4e04", "path"=>"providers/default. | |
rb", "specificity"=>"default"}, "recipes/default.rb"=>{"name"=>"default.rb", "url"=>"https://s3.amazonaws.com/ | |
opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-b301b2d18594a1e9cc552e | |
2e85a9be96?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=jpA%2FLCHxIA6klDnFJYd21LmKhJo%3D", | |
"checksum"=>"b301b2d18594a1e9cc552e2e85a9be96", "path"=>"recipes/default.rb", "specificity"=>"default"}, "rec | |
ipes/json_file.rb"=>{"name"=>"json_file.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data | |
/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-db05ae653e0fedf3c9747fad170612df?AWSAccessKeyId=AKIAJO | |
ZTD2N26S7W6APA&Expires=1329588248&Signature=JQ4CYRqGsnAXn3oYFl6y8zj%2B7Pc%3D", "checksum"=>"db05ae653e0fedf3c9 | |
747fad170612df", "path"=>"recipes/json_file.rb", "specificity"=>"default"}, "attributes/default.rb"=>{"name"=> | |
"default.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a9 | |
0067d55bcbe98d8/checksum-710010283d3560b512263d52f8271aa3?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=13295882 | |
48&Signature=GXU8I9HXG9SE02Gm7T5nYg%2FYzjE%3D", "checksum"=>"710010283d3560b512263d52f8271aa3", "path"=>"attri | |
butes/default.rb", "specificity"=>"default"}, "files/default/handlers/README"=>{"name"=>"handlers/README", "ur | |
l"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/c | |
hecksum-1976d7bafb98f6be15781023e134d943?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=3uAr | |
c9jAFTi4LzQFSN93fpgZmTM%3D", "checksum"=>"1976d7bafb98f6be15781023e134d943", "path"=>"files/default/handlers/R | |
EADME", "specificity"=>"default"}, "README.md"=>{"name"=>"README.md", "url"=>"https://s3.amazonaws.com/opscode | |
-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-e82549ca7a038fa004b8a06b12a13 | |
611?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=JE8tRgjz8LezYIB%2Fj%2FahFtZ3anI%3D", "che | |
cksum"=>"e82549ca7a038fa004b8a06b12a13611", "path"=>"README.md", "specificity"=>"default"}, "metadata.rb"=>{"n | |
ame"=>"metadata.rb", "url"=>"https://s3.amazonaws.com/opscode-platform-production-data/organization-5beb2e18f5 | |
854d1a90067d55bcbe98d8/checksum-26ee3eb9b3adceb6e46f344c6618a169?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1 | |
329588248&Signature=7f3JoCN3ezOPuoZ5U5QOUKExv%2FU%3D", "checksum"=>"26ee3eb9b3adceb6e46f344c6618a169", "path"= | |
>"metadata.rb", "specificity"=>"default"}, "metadata.json"=>{"name"=>"metadata.json", "url"=>"https://s3.amazo | |
naws.com/opscode-platform-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-1abcd0bf10723 | |
4191c48b4121002aab5?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=2PvrKHR%2FudYDyoAz15QFK6R | |
msMw%3D", "checksum"=>"1abcd0bf107234191c48b4121002aab5", "path"=>"metadata.json", "specificity"=>"default"}}, | |
@attribute_filenames_by_short_filename={"default"=>"default.rb"}>} | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Synchronizing cookbook sql_server | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:5ahFf54DWNEtmglqYynmBJkhKSo= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:08Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:08Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"ggh+MkAIxT4oWleGOv8M47k | |
Pn2z+DspTs9l8f9m7LhnLkN2xPikvu/1WZZJK", "X-Ops-Authorization-2"=>"SnoRoH5hC/1ZIJT9UXMA5pJejkAIIZKR7LlqudLANQjY | |
UNTQJgyrGXCszMUb", "X-Ops-Authorization-3"=>"ZWsuY8DmJOzsIfg8b2VBYyqDb25YtnhrLr8GTAxG2/Qz35PuAzErauBAmhTK", "X | |
-Ops-Authorization-4"=>"afwkv3uP5cYt8n5OLfp3K6yfeyELceHPxQsXitxMd0AJ5ImkLyEhtvL6Fef3", "X-Ops-Authorization-5" | |
=>"H4/T24F9uQ9avBaiEp5F+sDd5acgd0vo83kjOkW7thE+v7TSkvO2OlZn6lKn", "X-Ops-Authorization-6"=>"Wm064WbF7nzl0WgPsK | |
EhwnFs7QyIjbedUkZ8mwrlOQ=="} | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-395e4cda614b462b151de31f384a4cb1 | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-395e4cda614b462b151de31f384a4cb1?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=uBcBhcD7D6bvaNSEXar7dZoOuiI%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-2ubt06 | |
[Sat, 18 Feb 2012 17:04:08 +0000] INFO: Storing updated cookbooks/sql_server/recipes/client.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Creating directory c:/chef/cache | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/sql_server | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/sql_server/recipes | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:qLcJ6Z055W2mUTUGLMG2W0UTIWM= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:08Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:08Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"I+4XkdmutyF1pY1NTlBQOc/ | |
j6v9KPAUGv8b+ZALvXhMSiOKsw1VGruC8w0d8", "X-Ops-Authorization-2"=>"cm9kLqS8ped7ARWcCKZ1QJknm7GQkGAXcyWQtZ8K+jPQ | |
utlmjpjzI1RtKkh9", "X-Ops-Authorization-3"=>"iLW6kApd6819mLpReZXn/CkX5uWuXupJSdDKaqVNupWpn3x7+JCf5tu+mgqX", "X | |
-Ops-Authorization-4"=>"SEmtHSHe8muxVxWKzSLXrBwNmnG9QW6fGwX4LEKe1w4Dp0L0TSw6HGE+CUiP", "X-Ops-Authorization-5" | |
=>"fFoRlxkfgznUOHPt7Dyx4ivrhncRYIZojCysju2FVYXQ+plOL3kATRQWqCy4", "X-Ops-Authorization-6"=>"LNBp+/+C2UzA/ZvvaF | |
Xi2IcxBARYdoTkoYzwQV4GjQ=="} | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-4e8c4dd49d3996831fa419098943e264 | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-4e8c4dd49d3996831fa419098943e264?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=Uy%2Fsg9rJCzAcSgSLgNJjCnzPoJw%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-9svauj | |
[Sat, 18 Feb 2012 17:04:08 +0000] INFO: Storing updated cookbooks/sql_server/recipes/default.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:bvKhJliPsA5lyAKVbHmDggCGpUY= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:08Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:08Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"qYIYHrekXEtw2hmFHGjq6r0 | |
qNitFhL+m/1MUq5nR8opy4nU+Qb65Op36itRy", "X-Ops-Authorization-2"=>"/pfubcFhq0OG8MuoWLitcn3/gyxuw5aQ4iItn3aR8XJL | |
sLGYx75Z3xao7z8o", "X-Ops-Authorization-3"=>"igRmAoOpT+NNRS+9DzrzJvU9V8OaEEhz18aK0ARKJwWldcFm0bYsNEtN1EG3", "X | |
-Ops-Authorization-4"=>"i7o+hd8MjQMBxPyHy9GwjOUPSET8AeyzCCyexRaamDeLSz37T1eXjSxTGp3U", "X-Ops-Authorization-5" | |
=>"4mJC97Km8YhywXWL+x3D9X5DsbNLh5I2pV0VGT+n6OM+RTWJb6ySc5NI5sFT", "X-Ops-Authorization-6"=>"nI1R44tld80VhdMwvr | |
uStK669geB0eMR1rHmI5x+6g=="} | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-6e96fc65285000fbc04801b8b920dfe8 | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-6e96fc65285000fbc04801b8b920dfe8?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=pI6niNhRZAOfhTkK7MOKAKAcDBY%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-12k3c51 | |
[Sat, 18 Feb 2012 17:04:08 +0000] INFO: Storing updated cookbooks/sql_server/recipes/server.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:dpNo9Nxy1N0P/cWyjLsTiJpd0wc= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:08Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:08Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"HkTKJQ1QIv5FGvrSoyE8cHR | |
gmFc4UzmB537q9CpPbWJ8UwuwlLbX4r1pb/ZA", "X-Ops-Authorization-2"=>"mB7vt45T/kIqZOXDvnjxJOiDByvF8coUNvmxBIexr6WR | |
7HwbhDz95zshCHT9", "X-Ops-Authorization-3"=>"GZCBrxJi2dhzkGJ7ovh2MEUwYgMYkAY3WCfHBSqLDmgCTsdNrWyyMxWaUJlt", "X | |
-Ops-Authorization-4"=>"gFoNUy5svKgTHuwr5z/KxNv1FqmDN+vsqiVsxf2sejHlP5D60jRczPKCEdXQ", "X-Ops-Authorization-5" | |
=>"LlWNoar4BeVOrKbNbtmr+fp3Kb6pQ9q0vBe8Feig6PxjZ+QIFgI2Az8WIVjF", "X-Ops-Authorization-6"=>"1p/bMv1Gh+a/dy9SeN | |
fuObfHArNIEXh1QWv94vEDzA=="} | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-5f9fc3142e6965f2aca8bca763d170ed | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-5f9fc3142e6965f2aca8bca763d170ed?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=gQbZYplhAQQ92QCfkHFld8SsI9g%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-eyw596 | |
[Sat, 18 Feb 2012 17:04:08 +0000] INFO: Storing updated cookbooks/sql_server/libraries/helper.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/sql_server/libraries | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:qNamf0cxcRtPbaHHmskUK2Vqo/w= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:08Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:08Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"mvihJ+1zc6tHaqy+jJZ1x0T | |
PvjWkko00qTJleiD2fXuO3wxher2BI18Nqw3a", "X-Ops-Authorization-2"=>"OiPqa2tDOVMvm1jx0SEc5D56+gx/f0iZO4pg1ZE6zWNC | |
/TUJZN8Oj0diJM5d", "X-Ops-Authorization-3"=>"meUAFlKXTQ+29sWJ4EbsQus2p40aLstXN1V1SA2Mw9KuXln9rQls+k20G9c8", "X | |
-Ops-Authorization-4"=>"ZSefdsq0IHIUfXuDI+xnxf2Pj8D29S0R3dGAaUaPL1uFGBZ1qHxLClHIqroZ", "X-Ops-Authorization-5" | |
=>"WX2OtWG303UOghWLxFYJBIzxcJPS6oiCP3zpGfQqX0MnkXl78H2h2XFS1a5/", "X-Ops-Authorization-6"=>"KS/o20Y3mNLL172FiX | |
r+5F8L3W99qkWdQtoiokv9jw=="} | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-0dad586b72c47622851e9f163aad51ed | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-0dad586b72c47622851e9f163aad51ed?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=bqVZxNW22pKKESuc0Kf9hVDnAhU%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-mya1s7 | |
[Sat, 18 Feb 2012 17:04:08 +0000] INFO: Storing updated cookbooks/sql_server/attributes/client.rb in the cache | |
. | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/sql_server/attributes | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:/hMIG2iDNqYYFQNWPrm2A3yQKfw= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:08Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:08Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"f2Kr0qUNpTIzhY5sgKH/V7s | |
h2gja74LebuKtnndxxbvTkYWueAAyXPviLT9W", "X-Ops-Authorization-2"=>"iseiOeAkhBb7YtGkh2lZn7My5zv+Bfp4ojyfClzPw1OK | |
SSr9NhUMAgwFngK+", "X-Ops-Authorization-3"=>"4lRuEMQ1/DojHvj0ZGFtyXc222GgB3LoPxuNmGW0STAv4BeK6C9OwYk7u9nI", "X | |
-Ops-Authorization-4"=>"gT2rRM03lop/FvNsrmr1ZZXo05n5EdV8tKa5v1+VD1+1rtB7USG7HWDmeCpb", "X-Ops-Authorization-5" | |
=>"jSnzuASOMXJvJZ91rs8/9RDwEI/CeTJVLfXAWkkFJmgaukf7DLnEH+fJDAxB", "X-Ops-Authorization-6"=>"D0DQoSf80eXxvn7tj0 | |
ruUqHnC+GllcRnlwg/cCJMtQ=="} | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-41bfed5c92529a2ddd6141342f4e21cd | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-41bfed5c92529a2ddd6141342f4e21cd?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=sNZ7Sj271gIw5eGeAZs5iOQ6HBg%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-7ag50j | |
[Sat, 18 Feb 2012 17:04:08 +0000] INFO: Storing updated cookbooks/sql_server/attributes/default.rb in the cach | |
e. | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:neKTFix6IA4RvxJrKzNE0+BWHj8= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:08Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:08Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"SYocJi+lqEb3S26aAHezFun | |
PUOzfd7pgFNQSGxrL4ygaxVbERtwI+CIxPESI", "X-Ops-Authorization-2"=>"wr9v4gWB51sC9OmmuH8ZnEWjQazalzLOIaxUaBIvuQ+C | |
0RdBmZxjizzDEI5n", "X-Ops-Authorization-3"=>"ECQN6dyOf7zlS40riGIF6PiKTWrh1LaDN8+aKrKlYZ+2m7ikDi0c6fpGn8z+", "X | |
-Ops-Authorization-4"=>"t6cuQ491nnHeJPggmt2QyRFwlN2YYT8KmJfxNIU4QCcCVwNadMCwO6SzsP/i", "X-Ops-Authorization-5" | |
=>"D7DIkmgrSF0+8rzyfJFpVpK6i6NAtwY8GRF/H9jvq6hjKWd/HTI5HM8NlS/i", "X-Ops-Authorization-6"=>"mMjorBJjqguKhFtmKg | |
QPX+xzJ203P/1uNQmGu7jVDg=="} | |
[Sat, 18 Feb 2012 17:04:08 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-c05f7b6b32109edbc16b4ec21c47be1f | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-c05f7b6b32109edbc16b4ec21c47be1f?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=SW9sc%2FkAY0fGTHyB%2BHFTmJNouS4%3D to tempfile C:/User | |
s/ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1gigxeb | |
[Sat, 18 Feb 2012 17:04:09 +0000] INFO: Storing updated cookbooks/sql_server/attributes/server.rb in the cache | |
. | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:uVL7S0bow+elJKgm/GHod/c/sMc= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:09Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:09Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"I0nMM79Ow9gESMFLs0r1FHO | |
WfVmbKiXNyiD20OnYMrw4jxtPEVL4etjsTzcp", "X-Ops-Authorization-2"=>"u7jexeoJsvnTf0IlbLFaqzaQNfTBn4CzujE8YTz3fjWf | |
bepo7LEm6a+2mUA4", "X-Ops-Authorization-3"=>"8krSOu6K6Duu3QYDmaW8PIMUC7kzDr7x6HZXdHk62dm0M6FNph/WKEkBjUiy", "X | |
-Ops-Authorization-4"=>"PQqeLCvcAX66f/upTEmxFQlbjTyfaQIO9wx+4ZC9GHcSJcHctuoHCWuswXFH", "X-Ops-Authorization-5" | |
=>"47W0iphwfs2La7NUaVTHt2fNhjHh608oEAUKaguz5JgtgDiKLifiCwXGnznE", "X-Ops-Authorization-6"=>"w7h8FYLS84z8Q3MvZ2 | |
VjOvjVtqh1AKR0R4ay1/k8uQ=="} | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-07fd620a1cdc16d7949df298d1302093 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-07fd620a1cdc16d7949df298d1302093?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=0nwHAGurRvUFE9u12Zb62nrxncU%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-118ty7n | |
[Sat, 18 Feb 2012 17:04:09 +0000] INFO: Storing updated cookbooks/sql_server/metadata.json in the cache. | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:YcemfBgFYGlnSWOKL9M1P6xMVuk= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:09Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:09Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"4aH4deTpn4Oq7jClihTzcTO | |
5ykXjVQ3eOLD5bXi9BaDyjfv979Y1KcS8r/wW", "X-Ops-Authorization-2"=>"p/rJY8Sgq31bnmucBiidfnUn6RqkjQfXOnecNIZWURJ4 | |
jbGlECntIj1H6yRb", "X-Ops-Authorization-3"=>"UOIk5hHxFahoyL7SUz0ouyIgf9GeZMdans04bO85z7vEXvGExqcD4uH+GpIk", "X | |
-Ops-Authorization-4"=>"1mo+0uzkmdFqlJOA/lDCweXGQO8w2cFku/UY+OIahwV9l5SU+xLLaBA8k49z", "X-Ops-Authorization-5" | |
=>"fskZlcH1J59ztC5HC3OH/FkRHVn9uzJpALaMwB7Uch3k8GNgH4xUhk2eMkPt", "X-Ops-Authorization-6"=>"pdk+xeT1gcXCMK7Qlf | |
AOvY2OxegGHtIfwURWT7LGCQ=="} | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-67f100703d5232d93f805c7d26e463b3 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-67f100703d5232d93f805c7d26e463b3?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=efgPuhiNvwGmlfwfDCSRkzHFoi0%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-16w29mu | |
[Sat, 18 Feb 2012 17:04:09 +0000] INFO: Storing updated cookbooks/sql_server/metadata.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:vzpK3JnewELO2FD2kdAvhDw6v3s= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:09Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:09Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"Jg0omnHjK+K0zWf1wBOXkCX | |
pY3Ah/gFTkoR3SeHqXxAwpy+j1Xv80McPjSY7", "X-Ops-Authorization-2"=>"fXfesGPF7iverfUIfPLwN6mWgrboSPT3mMM1Bfp1rYXK | |
dNKLRmbOqI151K3u", "X-Ops-Authorization-3"=>"LubgIjwb6qUgZD26S6a4KbKfTie7MXSbGwgmV95EbmJqfOaA2MqMUsEwS7oa", "X | |
-Ops-Authorization-4"=>"u+Ujp0W5Eh1lZVqJIEUbKx+8v3Hjy3qeUzbmCmcItDAqKU/XC71I7zV9IJic", "X-Ops-Authorization-5" | |
=>"F6a7RbXokaEkdWqZlbb3GGsoht4/wHbuRncnUcyDeR2fiVtb3QfKLRzICVh2", "X-Ops-Authorization-6"=>"TZDIXiEstjTqjQg2K+ | |
2gbd/364w1QKDHHrXkMrgclQ=="} | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-a28df86fd2692d11cb93507571e22b77 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-a28df86fd2692d11cb93507571e22b77?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=pSUnexTehzTMFfQyj1v5ls79WYI%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-y9cmdk | |
[Sat, 18 Feb 2012 17:04:09 +0000] INFO: Storing updated cookbooks/sql_server/README.md in the cache. | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Synchronizing cookbook windows | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:XO8FIWgZbXD3lcAjzP7ipPw/7bo= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:09Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:09Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"X4+q9tYhyZ7i8eraK/JiWpX | |
eC3orlh6JNGpiN7V+NnKk6o16FGMtXqiOZ55r", "X-Ops-Authorization-2"=>"n8kjq7ut8yQ3lED07SWo96S36nhLwMlN+gXGFVw3/jmY | |
1qbETLgmNhCx8klu", "X-Ops-Authorization-3"=>"/5RLG3CmKNn7DLfXMK+aBjQWFcIsUqUgOzG5kSgQBSHmbzfBYQGgRRCFqJtP", "X | |
-Ops-Authorization-4"=>"iD7xiY/AFw4x9rbP+CGpRCxCZDG0xgWDIp2o5QkZF3vRqR/ObPoHwBSOFd27", "X-Ops-Authorization-5" | |
=>"d9tWxq7Sao5eW1FUv2/Yax6/p0cIDw/CFh8278r8TNCtGSzydRyYffy4D9XI", "X-Ops-Authorization-6"=>"uHVsvqS/dfJke1J59d | |
K5aUiBEZMXSd0s0s6rxctgbQ=="} | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-f96479910ab96b5f06315c0ca0b302a4 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-f96479910ab96b5f06315c0ca0b302a4?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=Qq7hFcs2Yz8CQRt8VCgDL6WYDjA%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1psuie3 | |
[Sat, 18 Feb 2012 17:04:09 +0000] INFO: Storing updated cookbooks/windows/resources/zipfile.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/windows | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/windows/resources | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:TWywjttJERC3i4tsW/W2j1X4VJY= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:09Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:09Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"Ndv+i4JNUuakfZuszOcD5Ny | |
bDYdhdiwBhltqgGWw0MBa2HZdtHkxaIVLYk6A", "X-Ops-Authorization-2"=>"ClnGhFrMYbEqtOoy8/XmPBlQWufNkYKICfLmuLReBAJ5 | |
6MsRda2e2r1Tr073", "X-Ops-Authorization-3"=>"kbcq1BviyddorthNDPM1ITZzRr415SCcWB0xDGbpRYb4vKRUpTpjcECZY/Uo", "X | |
-Ops-Authorization-4"=>"iQc2dcPcWm893ep4gKPfFZmLDQ7++KwbeG/z+ibtAE/oUr+aQXV9kxLwsp6j", "X-Ops-Authorization-5" | |
=>"LV2OykryuOmrhjx91+l21LAEpny+31YqcOq6FCY4u7OYFB4mTxFh6QLqdmdi", "X-Ops-Authorization-6"=>"z3qOpgHK4rnuJbLy4H | |
kIsbOOAR6/JPlXQMn12o6AmA=="} | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-5317f17e18e8edf0dbed3b67f2a0487d | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-5317f17e18e8edf0dbed3b67f2a0487d?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=Kk9pUI3vtbQcttnkjn%2BcDb0j6zM%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-evy6ft | |
[Sat, 18 Feb 2012 17:04:09 +0000] INFO: Storing updated cookbooks/windows/resources/package.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:ZCzqueePeQoBgRdhVbc2E2QwcnU= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:09Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:09Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"LyulphTFCVdXap3ik0JbS2/ | |
6LY2anvni96eyhFLIeOH/ZX1HRweGYV9xdt/K", "X-Ops-Authorization-2"=>"PmrD2V3OZSKi2pl8FqCVGrVCE3jM2Mxzdkqh7ya5d8w0 | |
NWUpGt9FHbom4Ari", "X-Ops-Authorization-3"=>"K7aWs9mBtqCFg4NaLfoICYVyrctwPw66wmX8f3kU9lPnMlU07hDl3Hn5nhPJ", "X | |
-Ops-Authorization-4"=>"nyfo/SGrdIASVvbqtPOZVgLjlVq+vvs6aki/n/nS00KPmcOt4iU/SrKPjytI", "X-Ops-Authorization-5" | |
=>"77MM/U1imLuptPdFuCMzfQXUKYHtLLRNqTwTX0FHemQKi1LL8CFvaYpRVM++", "X-Ops-Authorization-6"=>"UJcWS1bPx7225IHCgn | |
d+QlXRROyMMoEEd/BTEoaw2g=="} | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-c58c55315e2898eb773c1bde8d585709 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-c58c55315e2898eb773c1bde8d585709?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=3tQ0YT0Th%2Bntah8hm279FJGc800%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-21skdd | |
[Sat, 18 Feb 2012 17:04:09 +0000] INFO: Storing updated cookbooks/windows/resources/registry.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:8EzBw3uRSIosTfYi8h2xeydja2M= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:09Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:09Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"bTfd3SalWElIrVUy3iUu+JJ | |
5lbgoWzy+26A452fKJW4+5MNBVmQV7Af5BJ1/", "X-Ops-Authorization-2"=>"cmNvTJuS7FaPQ7HnXxjYyv8alx721GmtbS13wu8zUJ6Z | |
nyO3Q7dKttvgwf8n", "X-Ops-Authorization-3"=>"h14MaFOmMmpUMdPvJ6C8CY9ihfuCWJeqlcOdohJYrjLgsi1CRg2TrhLqYRU7", "X | |
-Ops-Authorization-4"=>"bhAWkz03zabznRvwEgN2U9mBaGmkpdt/gpLKpjIPo0PYeELvbu8ogiVINVNx", "X-Ops-Authorization-5" | |
=>"tlvedTpeh/D8Fe7cIcKZy6XFu4CfzYmkEaGNOopslVKmadfzdJouCIJYdyHH", "X-Ops-Authorization-6"=>"WsMMrKDr4SacKBr4YM | |
+UqsDdxV/gEh4s6hCvdw4fwg=="} | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-8916c5b22a18c87947dff58b71b974af | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-8916c5b22a18c87947dff58b71b974af?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=suXa1WlTvHI0o1TmCDhnkosQZI8%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-9aq6np | |
[Sat, 18 Feb 2012 17:04:09 +0000] INFO: Storing updated cookbooks/windows/resources/auto_run.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:saEGOn8Qr8GVLsdGDdQqzmfTMh8= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:09Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:09Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"3qjb/IkRQogRsQeEBifugb+ | |
t4NWahTy7oVoJrgAh0GFhZxLg0xWNOiZfssxU", "X-Ops-Authorization-2"=>"mo9H0XF9+6E/By5MLH91tb7jJFWJS5wVLfxjc45B6iZ1 | |
ulfWxqP3ksGYAwyP", "X-Ops-Authorization-3"=>"9FJN/FycBd8AJnhU1vxCPn2kMoKsdoaXwkA/tc5i8X84BvF8teF62b4Hf1eJ", "X | |
-Ops-Authorization-4"=>"JOFQMtpkWKE3OuFIOmHfnqBDnMedzVpX1+2Fuw6c3JzhKJYfc6/BBvarzN2W", "X-Ops-Authorization-5" | |
=>"w79D8cHHWPdTPv+YpOX1cPR0BalgqwqDaD2odjrz1Tp3IdywWIeLN9kSQF5y", "X-Ops-Authorization-6"=>"S8Lwwb8CDpId1MQKPZ | |
4wBw44Mi1jkwA9GSV+XzyzmA=="} | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-b8472303b776c2322600a0751c815395 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-b8472303b776c2322600a0751c815395?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=%2Fci%2F%2B7kH0CLOaDIwtLpcSVzQpWs%3D to tempfile C:/Us | |
ers/ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1agim4n | |
[Sat, 18 Feb 2012 17:04:09 +0000] INFO: Storing updated cookbooks/windows/resources/reboot.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:1f1shlHN1l+sx17U76UEJObKJak= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:09Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:09Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"AzQ40p4FuSIpWfWEC6va53W | |
BL/qZ2xSWSK/lE/o4ixWleQRMZAeb20YPNIwz", "X-Ops-Authorization-2"=>"hDCZdumT1dV7g/qq356D8ZrEWXzeEx69wkr04Y7+ZRCs | |
Q/3cYWFFlUerJIZd", "X-Ops-Authorization-3"=>"45ptcC9GxY3S7gFCuiZcpUuendrTO/HzjGG508hxg0ITD/c6OJixVeOr+Fnj", "X | |
-Ops-Authorization-4"=>"FL0MndKMCojnC7Ig7Xbhivr3G7E34htjVP4HX7r7wzwPqXQP2dlcGv5dwp+b", "X-Ops-Authorization-5" | |
=>"16AioMar27aXUv7c9XRnfKeOKCkQZDktmLuD60w4wxL7cJuUGm22YO8prcK6", "X-Ops-Authorization-6"=>"AmrWtOLsm+dZGCG2MH | |
YE81EaYsuwsZFgEc33ckE70w=="} | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-848bd700c257e846d1011bda420d54e8 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-848bd700c257e846d1011bda420d54e8?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=ds2sh%2B8O02e%2F73vdTzW8QwPTrzA%3D to tempfile C:/User | |
s/ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1ylef1 | |
[Sat, 18 Feb 2012 17:04:09 +0000] INFO: Storing updated cookbooks/windows/resources/path.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:mG/oWveiAkMfcZ7eASGWwEeXL2A= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:09Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:09Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"p0Bo16nBb/96dzlQs+27Rn9 | |
4INpUnFjTOh0rHdQuGMBmINUraNElDRtn5O7N", "X-Ops-Authorization-2"=>"8IsKd02bWTOlLMfBaDXVrz15oc3HHd9V1me7DuLcY5HT | |
c/Lj7M8gAHrBljq1", "X-Ops-Authorization-3"=>"4nXazGrzBMJOl9lIuQ0yDfInwAO5SbaNVPjx5xamj5q26TJkQLAp1EW2NNE6", "X | |
-Ops-Authorization-4"=>"cVWVRc+AnRMJcFcrOO3SLTgFpDVApt5b2E1nXz1HfUg10CCvtfyXEiFU8Zju", "X-Ops-Authorization-5" | |
=>"+pDfRvntysocwYGpjNZxKhquVxDXEFh/F3JyvCvcOE10Dkg5Lj0j9wO9tKYN", "X-Ops-Authorization-6"=>"ScfOC3yW4qK5NF8cjI | |
kwvZI1Z/sLxm61fRbvXSmY3g=="} | |
[Sat, 18 Feb 2012 17:04:09 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-53fe31b998dfd009d7b8f58fa2380c0c | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-53fe31b998dfd009d7b8f58fa2380c0c?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=7uziTu%2BWkHNxkHjWiqw54AXCSMs%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-jfvwkg | |
[Sat, 18 Feb 2012 17:04:10 +0000] INFO: Storing updated cookbooks/windows/resources/batch.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:UPJqo7uWQo5KQj9/OYwwLREiBgc= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:10Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:10Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"aBvavBet2HDP64KESK5y0PJ | |
TK85mX0qiQKoQA6GjL41jN7uHdCO8qWNRBlkI", "X-Ops-Authorization-2"=>"4CCPci5726clnuA1tNMWVTS+Rd0PJLHIOBF4MSbv0KGw | |
4T7VyK6dEoa/zZ+c", "X-Ops-Authorization-3"=>"sACzvnNcoa5SwBkj5yq81K4qaegD/xZ/UhgKtwlS5HKruCWZhbBBM/5m/vj7", "X | |
-Ops-Authorization-4"=>"1Qvu4V4DnjghehlBHvYDzxfJYMFR5bGojdv1uvCkL6IyBhFq9QxBSTq8tcYd", "X-Ops-Authorization-5" | |
=>"695dBD5878sVckjRCmwkmXJGj497deTPKesIPN8dTk4jLuIjg613rX4Hrhn3", "X-Ops-Authorization-6"=>"PASNTIN3s2J4etJPzs | |
ogaOwQmPqSx+lmxHpWk6vJRA=="} | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-60e1a5b1b17dfc60285fb28fcd3870be | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-60e1a5b1b17dfc60285fb28fcd3870be?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=UAIlMzAJ%2Bgin%2Bgh9zd9hAvPwgX0%3D to tempfile C:/User | |
s/ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-s95g9e | |
[Sat, 18 Feb 2012 17:04:10 +0000] INFO: Storing updated cookbooks/windows/resources/feature.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:z05FzU2llHmPeVilJZTyLaJDXeI= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:10Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:10Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"k1WjQVmLfGgMVSZ1UaDfgkV | |
mLHQtvHdiZ9JwL7yXxDBPhk3e/ZRi+CCZLQ/S", "X-Ops-Authorization-2"=>"m62KdamvuNgonEEqTRBXD+bnVWX3kj23lha9YjUBPG0b | |
ebY92uwn65sFAu+y", "X-Ops-Authorization-3"=>"A5RJmwAUUeMw2b+m4M8dHnwaIRnvjlScwXBXC11UBOq3re1LLb6nrjJAG9f/", "X | |
-Ops-Authorization-4"=>"28WGASh1Bt5tTgbpDi4z34VxcOZ/n7UOMP1I1Cc+qrf9k0s9yFP/eM/2IG5i", "X-Ops-Authorization-5" | |
=>"OFsbM7FuYERgyrjwgiY9yw5tFiekh1sMGLwOpRGIjtyZdc23NdEAtQDd8/YH", "X-Ops-Authorization-6"=>"UJap6xNuGGOhI6pybv | |
dMZ4S/nEjcL51HnlDCXo8qAQ=="} | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-2c46e31754b7e949a5857e2957bbc255 | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-2c46e31754b7e949a5857e2957bbc255?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=DqYKUVvu%2FlJBgqSDgXV%2B5I0LL2Q%3D to tempfile C:/User | |
s/ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1nmbl1j | |
[Sat, 18 Feb 2012 17:04:10 +0000] INFO: Storing updated cookbooks/windows/providers/registry.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/windows/providers | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:EhCBBVO+UqFTkJ8Gispim1YBRNw= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:10Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:10Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"lDhg+MFoeACCc8D7CZ0bwss | |
kwBi7y7Ik4x1mo291kAV7MUGW9BIS2F0LDYeo", "X-Ops-Authorization-2"=>"Np5uAOK6HJHJg+G952GidhnqseaUAuR7yFAC6WIsAnTw | |
59dl6TpfZgSo0rrT", "X-Ops-Authorization-3"=>"oUKARXUGtfsvs5KUFccx+C+EyRpqVz9GKYPZqMo5T2Q6Y6+Ckk5Rr03wgAN8", "X | |
-Ops-Authorization-4"=>"xwEuy3Ej2mG77Zo1jT358MQ4CSFFHKWPcD3ObEvFLlHzX0Vg5HygM4FCCvG5", "X-Ops-Authorization-5" | |
=>"4gpBl7WZSf8zEbOuer8JqvOCdmIsIB+d6w9Qw/YVSN+HbzkZTTNYqGG2n68C", "X-Ops-Authorization-6"=>"OJNubkbtYm+eVLQmz+ | |
SG5+sR1qO87mL60z6DlSxZQQ=="} | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-f52bafb5e9ce97d2a7258445b6b56406 | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-f52bafb5e9ce97d2a7258445b6b56406?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=a1l8JU0thZ%2BzJSOPi5KjODH5HUU%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1bzw54b | |
[Sat, 18 Feb 2012 17:04:10 +0000] INFO: Storing updated cookbooks/windows/providers/auto_run.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:MdzrBoCHVMANMm0H8fjENs3lHWk= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:10Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:10Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"Ml6DIvrcKjolxafhh3xZwX4 | |
lh78NY2tgvdZcPZtHEM9yn+SKrHzfbRuyOKpc", "X-Ops-Authorization-2"=>"N31HfOmrHCQKWxooDyvzztXd9H1V4iKRpTu7DgX4YvA1 | |
nnBqEsXxlLa3oCZO", "X-Ops-Authorization-3"=>"F1OAfwd6rx+7MCpRZryjG68Fa7g0cVHzPdrCMMDWGKcnsIePvKmdbqCTniiv", "X | |
-Ops-Authorization-4"=>"31TQTO3qRH8alM+15KuidnsfFOGxmC0Iy+pHE68WQ+tlj77jeBu/FT6/PNvV", "X-Ops-Authorization-5" | |
=>"WLmmAgt0qz4+T2kfXeY5nTAJ5AC/s4adVaO4wHwK5v+aKHL8bOxko36u4WhC", "X-Ops-Authorization-6"=>"0ZNoki7GiPqf+S4Wf2 | |
iz44ee/0dAAyh9oLK1sKJEgA=="} | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-271dba97116e58581ea4c650386dd8f3 | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-271dba97116e58581ea4c650386dd8f3?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=PnG8iJNzgPFoOWGHrfZrUreMHLo%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1hiiv6s | |
[Sat, 18 Feb 2012 17:04:10 +0000] INFO: Storing updated cookbooks/windows/providers/path.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:AM43mGc3fjgBAYttEy0x8TM5h9s= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:10Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:10Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"00mL2ncZdURmNyotd7zFnpD | |
nwZ6Ixx+JTuOrWPeMdRWMWzcv5NYZKecZCiG9", "X-Ops-Authorization-2"=>"oSIrDrirEBoL7QlA2BYRW5CEAT5t+0VuuguwxFf3Gn+e | |
Eu4jXoAhaWVJm/4/", "X-Ops-Authorization-3"=>"5HUbVVUyhWMN+ytJw1mWUMhhCWw5Cuqoj/s8G9QarKC3MpjNIZwKkn5XIND+", "X | |
-Ops-Authorization-4"=>"yX5oCm/Bk5DB8/DXldl0FLn3nuG3N6XVn8594IYmNKGe+rYE8BR9G6w3zvMN", "X-Ops-Authorization-5" | |
=>"YXo1ETqaCKCrlcbX5jrtikEaTc04w/7NJd0vgBk0aoydyRFB5hWLmRL0k/5D", "X-Ops-Authorization-6"=>"EdQzN0Rvho203Gsgji | |
mEi8A5L92pA88Ru+AcrFSrPQ=="} | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-e58459cdaff6ef1bafb9fae64dffcc86 | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-e58459cdaff6ef1bafb9fae64dffcc86?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=etgh%2B0ptFnOwNfiW9sFopDqN7a4%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-dyzpnu | |
[Sat, 18 Feb 2012 17:04:10 +0000] INFO: Storing updated cookbooks/windows/providers/feature_servermanagercmd.r | |
b in the cache. | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:JopVz0ITiYkkDHj/Ds2T3Fj1zfI= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:10Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:10Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"ltpIT9jisuiGnosYS04aPzq | |
N0UDv6IzCvwMbwprL2slKp/2tj3WZHq0j+bEi", "X-Ops-Authorization-2"=>"l5OXTPjkGMl1lwz0GH9UGN0m6Jr4I2Wv8A3aAoEA+Rdx | |
sM1UJBEimk4094SV", "X-Ops-Authorization-3"=>"gQly+sR1DxHUZewcbTe4fUSXrBiRMLOqsgTP9TAIoqH7540h9ZNy1EnHIiS/", "X | |
-Ops-Authorization-4"=>"rm3oVIu07BO8grmkL2raJryMpK3ITkATbnuuyyA//kJDYNSYHx/iUeZG+bNZ", "X-Ops-Authorization-5" | |
=>"05SdPLtlMFK5tTH1/BQ93AN++0Cu55CDvwrUlAAdySosC/ejk+FUvYnuhBfb", "X-Ops-Authorization-6"=>"OyMub4xLZ+emaUVvk1 | |
noO0oTvtvmNyRF+CUzltY2Nw=="} | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-7859415b67a1db7633695b1acc9704fd | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-7859415b67a1db7633695b1acc9704fd?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=jkzyZ0b33AWcOr1t5r8ERcVmBg8%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-13oi1ec | |
[Sat, 18 Feb 2012 17:04:10 +0000] INFO: Storing updated cookbooks/windows/providers/zipfile.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:UvNBy1c24udefTvp+CUJJKvLahs= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:10Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:10Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"EfHXg5xFMQiMUkg8a5Hd6d9 | |
wyDor6eO2G13uYXcs9bka2szmFPWdC9akSxX2", "X-Ops-Authorization-2"=>"B7JuMA/6nXXlOmWQfAzdYCB/tzJIAqXE7OCVld0M6duJ | |
jZDxpRrb7taHD5qM", "X-Ops-Authorization-3"=>"39Y5sy9GpTsZtQ/NMZb5BKpEYQS6A5rhCJYBsWxymsSUQH87d72sSmaFIE0b", "X | |
-Ops-Authorization-4"=>"d2VgvITucuegZ+uNEYS3KZh7lCXQcLimS4hRxSCGk8sMr7LS73XS8mygaLl6", "X-Ops-Authorization-5" | |
=>"LAqFNqmmut7Hjpyr68n81+i5LLipY6eue6a0In+HPi8WSxXT7BfUNmjA4N1h", "X-Ops-Authorization-6"=>"Hwbw2WLhOmdwduq0T6 | |
PWcWZWaYBhIrigKh9zMAti9w=="} | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-6aca1c8d5a8ad48c260e264f598e9bb4 | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-6aca1c8d5a8ad48c260e264f598e9bb4?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=EDnAPMUn1Ox88EY7Q4VB0Ll55W8%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-sls5f4 | |
[Sat, 18 Feb 2012 17:04:10 +0000] INFO: Storing updated cookbooks/windows/providers/package.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:uAbwASf/TXas2wm5fEt7SIGcTcc= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:10Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:10Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"Q9nvKhy8x7ZFV0HA1HYSrr7 | |
Paa3gQX+2V5doh1hfpD1wofdRGKy0coEcSi/l", "X-Ops-Authorization-2"=>"8pzNlkKF9qGnO5zv+r0TNFIr/LKShOmUrGNXlGOBafwU | |
ytF/lIVeg6BKRkEX", "X-Ops-Authorization-3"=>"LvgT7VM5sJLIbG1UE87ibqF2bSLVIMysZzGsRiZyyds6JEsha8pNaM85OfGK", "X | |
-Ops-Authorization-4"=>"XAxKgeLoBcGwEh1SXSpZ8fRogC/H5oTRPEg/OwKNC1VBhkOTczGACooZV3Ql", "X-Ops-Authorization-5" | |
=>"hpIWrKTX/5zanSbZSORVCTKAvYPFge5XHxFO8Z9yMS9/W/v8aCSBD6vL3fta", "X-Ops-Authorization-6"=>"OyVxVtj3VRxTnD1aDa | |
qd56kX0Jh7BTDwGOoQz72RnA=="} | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-4b487ea5f4b20a2b17c761badcc55cfa | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-4b487ea5f4b20a2b17c761badcc55cfa?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=1rKmNBsU%2FB50BxYzobpAIQYXBAQ%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-ncav4f | |
[Sat, 18 Feb 2012 17:04:10 +0000] INFO: Storing updated cookbooks/windows/providers/batch.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:y0J+UV8RIeIAT2cXR0g4LdNe/+E= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:10Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:10Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"dt+CHP8dsYnk18v1uORd+Dm | |
xFu0J+rfI4SwQTPbQfiK6D1URwC27/m/AdtwX", "X-Ops-Authorization-2"=>"oZ+sqpsWmx5GWbmXRLmwpF+/Wed64qERElf17tQUwa8r | |
d01B0zt60PqeKOEW", "X-Ops-Authorization-3"=>"LRZa+JXVpjqAn1qQIjkovV+6LEL4SqxRmGj7ImJMLN/c06DXYMXCNwl/tqMj", "X | |
-Ops-Authorization-4"=>"wITPaX4X3nBx6L/6I8ca0L96bTnTNfuzVFOBIH4kUBRwl+BBO6otEW9lS9aH", "X-Ops-Authorization-5" | |
=>"dLyrgq3DUEAF9BrXZAy25cTBnMCGtD7w2GoS5AEYrylb3kke0REJAu0ct/O6", "X-Ops-Authorization-6"=>"UaFXAWlLDDV3avFGro | |
38RHRC4BymN9dsY31iqmU8wA=="} | |
[Sat, 18 Feb 2012 17:04:10 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-706f2a6b16ed14193e45c3016a71a0c5 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-706f2a6b16ed14193e45c3016a71a0c5?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=NYNHRzg20otEnu9PqfCRYrz96DE%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1twtl5r | |
[Sat, 18 Feb 2012 17:04:11 +0000] INFO: Storing updated cookbooks/windows/providers/feature_dism.rb in the cac | |
he. | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:dzQwL02Mf30OX2AOp+9XfGgJhJ4= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:11Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:11Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"Qwyq5UedMF3owkQkcUjtLZT | |
JPkTKE8af+V8xQTDyYMsS2O8XTM9vrJf4KFkL", "X-Ops-Authorization-2"=>"FYVXwXin1xDhvdUAFhpnAhTOy8VIx70SUOQc7gBkhXpX | |
G6MRjNv10BTillZe", "X-Ops-Authorization-3"=>"mYyZSKr9fxD4J9J15Wz/m/b9DztV8tuUENdEHsW1smc876EYIGAE0NRlCWyP", "X | |
-Ops-Authorization-4"=>"TsOEfo889fb1v2bz8XOjAGwYf9h6H3RZtsC1mw4kJDBzNc0KjFLYmHoFbxGy", "X-Ops-Authorization-5" | |
=>"VUFgy2MPBWPIbtGiH09xSC2YUwbm/shXGeNaZuwylrm0BcYURUxZc/WsLfvr", "X-Ops-Authorization-6"=>"CJmTx4U+3VW3VsOaxz | |
9JB+qdRpHj0ZRsyQmTKg3XKA=="} | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-aa71d112a4856c8aaf422c7e8503e971 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-aa71d112a4856c8aaf422c7e8503e971?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=RyoSysJRgZ3kD3VRmpFo0XhifJ4%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-115b3vc | |
[Sat, 18 Feb 2012 17:04:11 +0000] INFO: Storing updated cookbooks/windows/providers/reboot.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:mNWII3asKKAnHQks/JVJnVeO/UE= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:11Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:11Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"NPEAKCzzsJS1yRlQi6nCgc7 | |
YfLUxwHuAc73KYNkm/nFeBTSvcwS8cG+hJanw", "X-Ops-Authorization-2"=>"7LwuTWIFww58dQ18uTaVq5UgKRdEq/A0s0gjP7Lb/dC8 | |
w1EyVYeZVT4bPoxH", "X-Ops-Authorization-3"=>"5nenweUAWo+rebjUFxGIsG4CQKgr9klIDolZgu/iwpcG6wUA27SXel37kk9g", "X | |
-Ops-Authorization-4"=>"YG4KcyX8QLqIiBFBrU3WDUXEsZARQX9zvPoAExLtqgTMoFPi1ddcaX4pt35w", "X-Ops-Authorization-5" | |
=>"y2XejcB25Gc2iGDV9IqgOCui9I0beGYw8fE3sDK58jRE7g6miWht+4eAkryM", "X-Ops-Authorization-6"=>"LGElSyqdHcgm5FX/KV | |
0uXeMz1x8pu6cMyIVX2eVcMw=="} | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-b8f4746c0dc02ee922751006fa0b9c3f | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-b8f4746c0dc02ee922751006fa0b9c3f?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=KedGzMRkiQl%2B06ul%2BNZG6X%2BgdvA%3D to tempfile C:/Us | |
ers/ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-q2solk | |
[Sat, 18 Feb 2012 17:04:11 +0000] INFO: Storing updated cookbooks/windows/recipes/default.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/windows/recipes | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:x3xaIFoM7B4DJe4DI3v6gL/JxLU= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:11Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:11Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"w7u4YyousigZz/Qw4II7RUn | |
Gstmd/a1bsM5rFBIvdK+iXUvqONfCfR7eH1D6", "X-Ops-Authorization-2"=>"Ywdpq3l+EmGTC28FiDbWbczyVQxgIpo4SXx86+o1d+ET | |
O9B/3ETEHyDc4qMs", "X-Ops-Authorization-3"=>"S7Pftl3t44QZu0fXU3kwKdxwVH1yJe9czAwGmgeB+KQIk3MHChF3OwSXTxCm", "X | |
-Ops-Authorization-4"=>"kjIXBaxB6bZuqeXljnaxVr6N/xr84ywm+RT9NDRguPCbVSFrShIDtsI8muCd", "X-Ops-Authorization-5" | |
=>"LvXiONPruQkLOwIR0dpSyrzOkpwfVzNAfO6S2FKWW6n3da159x88mj35ZrHH", "X-Ops-Authorization-6"=>"D6OcCzgcMmTaOIMv6w | |
HHSMBxawiWoV7Y6hTyOxJmvg=="} | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-a55d8ab514d9d9efae136a872711f80f | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-a55d8ab514d9d9efae136a872711f80f?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=mIziC4oaEAS3MdlZ4EHUQMdjOH4%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1tel8xi | |
[Sat, 18 Feb 2012 17:04:11 +0000] INFO: Storing updated cookbooks/windows/recipes/reboot_handler.rb in the cac | |
he. | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:r4WAELA/siorVId4TdQpSF/ywXc= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:11Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:11Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"C73BaVaBpv4R8MOROOgnKvp | |
MHL34j/AKHYITyeX/QyToKW/cPFmkZeTKltim", "X-Ops-Authorization-2"=>"euMwQOwXK3zSX9iwZxCzH3a1ciD/V0DAlz0e2qKLaFsG | |
YgWvYSfzPL4Zetp7", "X-Ops-Authorization-3"=>"duV6AmwZQ/qNpV1PaT/v0VNU4F3p2RFxNNrEsRHwwSVpXLzHdKDZDxchR32W", "X | |
-Ops-Authorization-4"=>"O6yYUee7iUDSJClfH8gOqYs2Wx6c/OHI6pFrWMDhdGi9YtKQBGLiUnwjO2eW", "X-Ops-Authorization-5" | |
=>"yI4hdXsqEzK9Hj4S4EUZBbtGuH/CKZGv+yUEmWDzVLpQ7y3qfpJNO327dmwg", "X-Ops-Authorization-6"=>"ihT5MBKEVjIVIBCrPa | |
8ML0StgHPi0gQY4JkmPRm3bw=="} | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-568fe3411d4a69f1c3c9b32780b24cf7 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-568fe3411d4a69f1c3c9b32780b24cf7?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=qFm%2BeREpTVIBnSFK%2BDKjWfmLpPQ%3D to tempfile C:/User | |
s/ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1g1xd7t | |
[Sat, 18 Feb 2012 17:04:11 +0000] INFO: Storing updated cookbooks/windows/libraries/feature_base.rb in the cac | |
he. | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/windows/libraries | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:Iind3eBT5h1hlNhnfrMoT2ayTAw= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:11Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:11Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"pUsKTQ+aKI0Qb9205Sc/jVE | |
uNIiK+5cA5EmULJyfIwnUdC4f6WadegBiEcwc", "X-Ops-Authorization-2"=>"2XT+87sKg3yxY9LpavSl7y0Lmb9TUitYVv5bfFOp1f8z | |
SHj7J+w410BIJvgR", "X-Ops-Authorization-3"=>"bxexl6O3OvKQOvPDCQg9FYfooVuaUwfTQCdpNavSAMQutB53b8rzR2jDnH8n", "X | |
-Ops-Authorization-4"=>"1oLA3uS8qD8EyiXMWb7iuMUBIu4mnlBSoR3+r4VU4AxGmCI9xqW1O0d740jW", "X-Ops-Authorization-5" | |
=>"i/k3+8a7/FGWqzrPjwy0PPZ/EiLxcB6BusJNpFz2V+OXqt4lXXofzbX9UsZR", "X-Ops-Authorization-6"=>"h4ND/IUjyaBb7L7pk+ | |
6vklFenK6fNUvoe+UtNGXJwQ=="} | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-76f502ee18c89d7beb68e7f13ab0e9c0 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-76f502ee18c89d7beb68e7f13ab0e9c0?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=7eiaV4gS4XGC8e46twRX7fNUgIc%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-121dlt9 | |
[Sat, 18 Feb 2012 17:04:11 +0000] INFO: Storing updated cookbooks/windows/libraries/registry_helper.rb in the | |
cache. | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:ls814imHEBCtqorz+lvjGasUwy8= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:11Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:11Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"Yl/55e25plT+e273GOBXgTu | |
/pgqte5ivw939SQxuAx7iVdu7vdPQPIu89BVN", "X-Ops-Authorization-2"=>"f0enzYPABwsOM95sRHSMV+Wap8ecYiu6God2xMpCawrz | |
/utjpBkEZSjp9WnQ", "X-Ops-Authorization-3"=>"gpKmOthQKv+T87/WdTjmE+xcB3QoZcOssTrqBupl+V2XrMXJEsFGKgEmTh6w", "X | |
-Ops-Authorization-4"=>"Kz4OySQxFvlQqOmU+nOQ7MP1t86OpSMiBBGjdYVJTownarTJ+bWN7ZtJW35f", "X-Ops-Authorization-5" | |
=>"PSLHluLbgqIRuHy6FY6495JwikiZ6R8/GdDNhAIPpsnt37TY2MA7kZyLLqRF", "X-Ops-Authorization-6"=>"9hoY3arcpWitLiEzNA | |
LIuEaQ2BI/u8KHNUsCjcpJWg=="} | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-cead86571eaa50734abbcdfc608025fd | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-cead86571eaa50734abbcdfc608025fd?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=nqwmQDawggxfeZRUVxC7Or14nNw%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1mlwdun | |
[Sat, 18 Feb 2012 17:04:11 +0000] INFO: Storing updated cookbooks/windows/libraries/helper.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:CZMmTkzY1M281uBNMZyW7K7I4z4= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:11Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:11Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"8CF5+6nGWI7G8KiaREQZNgN | |
fsCEyd6GJfm/84O/daPM85Da6vRWZ/jx+rFj1", "X-Ops-Authorization-2"=>"zQAoz+k4MsebP+TM8fOcFnDi1tPZA8u6bZJO2VrVFvIF | |
ycrZU8ZVMa5fsCgw", "X-Ops-Authorization-3"=>"e0VQdIv0zyEkQtvGNgqPfWlRN4mlkL9FWZvHU3lCL6CkekfP3vmGLoCv4e8Z", "X | |
-Ops-Authorization-4"=>"lGGBt9tDU6NEqQuVOjz0G028Td1NMjAKUtVUM2k9gw0zisto8RQGO8R6ilgW", "X-Ops-Authorization-5" | |
=>"n1ilGYAk6RUCvx29Al/wPybrsGeR8XVCmIbIiG1/8JVlhTBFZI1YJCovftAl", "X-Ops-Authorization-6"=>"G/PKO1XuBhpcbau8BX | |
OtB+mAmjfBX9dy9nD67JH0iQ=="} | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-724ecf2579c182dff0f21a92b262256e | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-724ecf2579c182dff0f21a92b262256e?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=nDsYVKjkkl2E%2FrXJSv4vjWjneGY%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-6f86af | |
[Sat, 18 Feb 2012 17:04:11 +0000] INFO: Storing updated cookbooks/windows/libraries/windows_privileged.rb in t | |
he cache. | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:INGcSeETOtEjqWQfxEQ+awo4/VM= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:11Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:11Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"zeIMs2rsmpdGFRIzApXbiC7 | |
ptNnff4smr7iEQQ51yov5epW0DauDLzo2etQ6", "X-Ops-Authorization-2"=>"e26BTljpgBu9vAh8KyL+MCgYJMecpWshPWbw/oBcDVfi | |
MLZJdzixX0YQJPYJ", "X-Ops-Authorization-3"=>"4L71S4v8Ad6fP8EIXg+I4x7l87uTX4G96lNDddqkqNbOQcZH2xuzfTnQyCJP", "X | |
-Ops-Authorization-4"=>"9yUmEzgCjZRYlX3t7O4d8DI5dnmpZIsZPGrMh2mO+bnoKFrhlHlviwpDPZrH", "X-Ops-Authorization-5" | |
=>"jYvaQkPMKQbu5HgrbJd2adCldPufOQFTesAVpt5/qEkTASxJyjvtKgNypm9J", "X-Ops-Authorization-6"=>"Ygzhu6I2M5Nxaplh8b | |
uhHLBqTeCeBqiFPpI9CwLK2g=="} | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-9b20966748f370b153659189191c3859 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-9b20966748f370b153659189191c3859?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=mpkkFFnwcaYqQwHOZA2AwP30OZc%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1xwjnvz | |
[Sat, 18 Feb 2012 17:04:11 +0000] INFO: Storing updated cookbooks/windows/libraries/version.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:I8U6QHTCrqZNwZGjdpF+STTJsIc= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:11Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:11Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"pzG7323oC+8ppAJLRr5bEt8 | |
FYgO/l4U8H3oEFP0HVY1KU5WWg7lpomnlOS0h", "X-Ops-Authorization-2"=>"ZEBkZnr0k6LozH+tKsIRdKAfrD262nszYjA39Riqh7mJ | |
xBQelnLHefQYWZHo", "X-Ops-Authorization-3"=>"IxXp+i6yikOysP2ORC/DKkBe6IlshhcEj3Imr+7VDD9358oiKVcsMJNfPkZr", "X | |
-Ops-Authorization-4"=>"RUrtN9sf2ZyIRhgFd+ElfSlKoL8ySCbbHOJqsQcApEL/Fq7kuVV4FOtPhFTx", "X-Ops-Authorization-5" | |
=>"udLoVOAYpUd5EJoxPfrLUbAtvBqwWt5NCnXUVClgtAer6dDmfC/ukn4yubDU", "X-Ops-Authorization-6"=>"jR6rkCq0ZGtbwwCO8k | |
Xa2GyIKC7xY3BDbyL+zMUxlQ=="} | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-6b1e4d953a821a36e60a3a434783a42b | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-6b1e4d953a821a36e60a3a434783a42b?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=G9RyT4s5spgs4NKsCz36NmjLsSM%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-14c05d1 | |
[Sat, 18 Feb 2012 17:04:11 +0000] INFO: Storing updated cookbooks/windows/libraries/ruby_19_patches.rb in the | |
cache. | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:/M4TRdR/onAR0j5lDbehNUnjkWE= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:11Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:11Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"EZvOANM49Zovl+jyyV6mFyc | |
ZE7uKJqfV49aV79Kj2Q5w7gyTqa4c6c6QN3ch", "X-Ops-Authorization-2"=>"MRKsVQBPjGc6XhbGA62LB1eLINgdAXpiQKixhIviowBI | |
4Gpb4NKIFOxqq8Kq", "X-Ops-Authorization-3"=>"CBknSQfOWKgR2nCBYOHFrTWtO7twMAcGy67BUrQMVpZHJTFByY5rOCpp7ShE", "X | |
-Ops-Authorization-4"=>"udaAi5y0LWOBQOZIQmHWkRPK4ShJp3WZqp09UWZ0+7cmkS5zeeGtrkmtKncb", "X-Ops-Authorization-5" | |
=>"nOl7U6miij2tlAjNcYY1a48dhtlp7BE0z0vDmFL8P13sXjzx2SUYMG2I8tK4", "X-Ops-Authorization-6"=>"ErvqhNrVUhCaAI6kKy | |
oaU5ha8PEv+2Xy1LHCxaL9TQ=="} | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-eda001f275230230125ff1c8dbcd01af | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-eda001f275230230125ff1c8dbcd01af?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=Dk%2BTtSA2bjxDl0sVU4zJUrZnfpE%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-17vappi | |
[Sat, 18 Feb 2012 17:04:11 +0000] INFO: Storing updated cookbooks/windows/attributes/default.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/windows/attributes | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:quxyGZCQm7794DxCnWsP2wYj3eg= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:11Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:11Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"fTCL8dAsGtwvJJb7gMQOKGo | |
RayaV+s3+7uYqrUXqbCZzbvtcEMAVExm/qI3X", "X-Ops-Authorization-2"=>"42kubc/MkF6NN0E1B09fwO474rGFZ/vSjIV5AZ/Q0ueh | |
zMaOLZbPdu7qNNTn", "X-Ops-Authorization-3"=>"R+wG9b6xI6wLhTJB0ZFbJxxvcZa4Tt5fq0ct09YyNHsfyQEjrypi0EH0knlr", "X | |
-Ops-Authorization-4"=>"A1LaM7VSqqzpPIlNNLT2adMOHBmChjoc+PD09cANdVw1BHiLN+n8KKpnPJ2V", "X-Ops-Authorization-5" | |
=>"bfDeUNdikbe7E+B32QXmi/wVLR2Tvr96qezoke4D8Z5e/aNZ+11RydkMTRdG", "X-Ops-Authorization-6"=>"Qwi6Xh5P0BKh7BvoUj | |
6zUpkPf93tSL9YnufI4g+lxA=="} | |
[Sat, 18 Feb 2012 17:04:11 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-d00cacbe68f1a7257ca40e0ae89293d7 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-d00cacbe68f1a7257ca40e0ae89293d7?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=jNiEbHYq4b%2BVzm6FDiD8n1H7OnU%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-8g6wre | |
[Sat, 18 Feb 2012 17:04:12 +0000] INFO: Storing updated cookbooks/windows/README.md in the cache. | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:TFyjdNeisk+kekYFmHivOpIH80Q= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:12Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:12Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"5Wy2oHm40DyCxeOIvUuxWzO | |
9xjNSIw+9BRruMyO8B66MOU6mIEv+WYfdD1uz", "X-Ops-Authorization-2"=>"poqa8362CNPQlI0ToQXaJMSq92krdLlXe3SvtJW3g8zd | |
jceX7EUrMAWnt4rP", "X-Ops-Authorization-3"=>"kmOa4aSPDpGakUbFvmLz/jQNQARLFxylwrP8Z8bqQm7ipja0fRcwXMDed5LI", "X | |
-Ops-Authorization-4"=>"SMGWtrHiatxHEFdvFHjF2eMdDBh9rY2bZAFtRJWydXf1oQwOE22MeUm0/jAD", "X-Ops-Authorization-5" | |
=>"/GJn/SPdrGKbFVk9vmHPW/3bp1AGBbQNTuz9JynAr4kTL+PUvn2mv0yiP5Op", "X-Ops-Authorization-6"=>"eYsJ2VFRprfXCUp93V | |
sX8e8Af5DLunsM/sscGeLmng=="} | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-fe5055d81afa103bc3e47692daa2aa9f | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-fe5055d81afa103bc3e47692daa2aa9f?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=6ZJpwHTTJA0R1E6mAls9%2Bb2%2Fw7s%3D to tempfile C:/User | |
s/ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-rbpqnz | |
[Sat, 18 Feb 2012 17:04:12 +0000] INFO: Storing updated cookbooks/windows/metadata.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:N02nZe7nHb/xnLR/BqIcFPugUKY= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:12Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:12Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"qjhkyCiW5xjA4Oi/AEcpKxU | |
CMimHlmhIjrlBHNs2aO9WQ5gKGgS5eldy9I3Z", "X-Ops-Authorization-2"=>"M5fkkCiG3Pks/Nj5tlvazvgkEX9kSx3XFvYk3HgFqMOQ | |
vv+WAkgJnEm5ygMT", "X-Ops-Authorization-3"=>"GL0vXn0BUoPqc2y0Xg+/s/VYbAqr3zUeBY1J33zdau+FKmEoDmu4/qT3khuN", "X | |
-Ops-Authorization-4"=>"dDZYXuVV+2PxIlabsVpLgxooqsRKwHWvJ+ByklpFdNhcrSbmrhjzEAw5JDVo", "X-Ops-Authorization-5" | |
=>"Qc2gcyx/nC8K3SKhnmlJQ3vNDakofr3420hAB0AlHG7p2S1XK+7IdpckQoba", "X-Ops-Authorization-6"=>"IrElCmj2sBj4OoXKPR | |
mZWvA4D+BEH7JkDB1X1IEwcA=="} | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-64a0f1e6dafcaa4a5a5077a0dd07a430 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-64a0f1e6dafcaa4a5a5077a0dd07a430?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=%2F910xraF%2FCEOqCZ%2FnNdIsLvNTUU%3D to tempfile C:/Us | |
ers/ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1vwpyxl | |
[Sat, 18 Feb 2012 17:04:12 +0000] INFO: Storing updated cookbooks/windows/metadata.json in the cache. | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Synchronizing cookbook openssl | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:oFZnzEjNP5/lQ4DfeGhpOM+zk4o= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:12Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:12Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"upPOnWjoepy9hdui0ncsxj3 | |
wJ/nfdVpA2tgKv2lFMSTV8AMuTHFeBcdIfzG+", "X-Ops-Authorization-2"=>"bjrH0O5W3UxkaXIEhxEMuky9CvPGJJVxXaq2FSWdgT3D | |
L+21sImlPJsQTuOI", "X-Ops-Authorization-3"=>"Nx2nuNgCGQrYa/KmQxPbD9gwZT+OGJ0xBq77i3g8Kzol8I3444tCSIU6Xsnd", "X | |
-Ops-Authorization-4"=>"pQGxhVqmv+zsoZ9EI1g0UdDfxeagSmkd5XjSTUIeh0MoU93EKjCKZTeFSMw6", "X-Ops-Authorization-5" | |
=>"x19U/jjflsGRBcK9KALz5ysp3nX25pmVBbyw2Yt3wR6HiBl5jDogtjahsfnq", "X-Ops-Authorization-6"=>"nqORVokwePHv0Xgf/t | |
fYdr1kXflpMfAcf0zVQvoafg=="} | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-cd9b688975824954297838f7d4214b7f | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-cd9b688975824954297838f7d4214b7f?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=C33j%2BGfpAdRYwpWWJ%2FpB2S8VSwc%3D to tempfile C:/User | |
s/ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1sxf0yt | |
[Sat, 18 Feb 2012 17:04:12 +0000] INFO: Storing updated cookbooks/openssl/recipes/default.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/openssl | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/openssl/recipes | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:NmujkbKHtqgYZMs3fvWO37TVQVk= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:12Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:12Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"LEG/sb8F70ft0Z1DKeYMtg4 | |
cyEQT0MJTWKyb3s4r5WQ/hk/GPpX2hgY9ZUQH", "X-Ops-Authorization-2"=>"l4gUbiumDOZDuZFbJObErIsZT1KZGOZYXxaNtBR6v8/y | |
CaKOhUTIAA9N75/C", "X-Ops-Authorization-3"=>"SSW3xWmUzCxS+xKf1fspE5zMqikDh9gYSf1tOe9zguZKXVbdAZfc+MglX1N0", "X | |
-Ops-Authorization-4"=>"7i85UkkzbgwBhX4pU9MIsxOw8eccXYWBnKZ69yuJQJJBbmdUBXVyQTQ43PJS", "X-Ops-Authorization-5" | |
=>"CI/Lq+L21/tjlKE/nxBMLSqreHHgdosRv8MdpNWK5bgkIm1ozcZCi11gofBf", "X-Ops-Authorization-6"=>"fzD5OVjN6TPvePGgEY | |
I0GOtEqoea+PPXHrrfyGL2bQ=="} | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-b3bf8b34c97e21c5ee6aa0ddb11b133e | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-b3bf8b34c97e21c5ee6aa0ddb11b133e?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=map9KKI5wHL9jvqUiLeF0%2FIewUs%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1090nb | |
[Sat, 18 Feb 2012 17:04:12 +0000] INFO: Storing updated cookbooks/openssl/libraries/secure_password.rb in the | |
cache. | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/openssl/libraries | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:VAjgsLrtLLp+W+kfm3rgAkIUDQk= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:12Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:12Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"c3asB+cVXVkHRWN1jWMsw86 | |
twtv1v1USAO/gjS7bXDoHezhwS6du3ihS/7kv", "X-Ops-Authorization-2"=>"Wk9DLoOTvlc+Fl64YmUq803Us4THNQrQzF9+1PKD4cMV | |
eL5mu8ACfzV0onNZ", "X-Ops-Authorization-3"=>"9W0nb2pTcBcnjhXpTYw96OvJug/rz+PffgV1AUlCPBGCzNnGIWnKH1yb5RGZ", "X | |
-Ops-Authorization-4"=>"x4cC06md0xY9NO1URqc3Kbo9+N+Ekc1Ut1r4pnSeXAbmxU+Gf5cvmc2ofe6W", "X-Ops-Authorization-5" | |
=>"HHCLp1q/Y/fHdM5q1Ozj0zn0LwM2lgnKLbHvW8Kr6wjUkZ8+mQWINygBSoYu", "X-Ops-Authorization-6"=>"nySzDKyuaCjI6z0vj5 | |
nTtZytKdVu85Y+KWC6a0h+jw=="} | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-f111ba97dc5160e26eee6473dc8e86d5 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-f111ba97dc5160e26eee6473dc8e86d5?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=qzmQ6CGatqTiyMwp9ylb6EozJSE%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-m8ppdq | |
[Sat, 18 Feb 2012 17:04:12 +0000] INFO: Storing updated cookbooks/openssl/README.md in the cache. | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:fDcCo0dYv8FM1LNHj2JXWEhqHMM= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:12Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:12Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"Zcw4qBDVVYrRinnuW0+LBCc | |
l+eaChjmPDtrWPy1VyJTM2+tLkqvdwPyZCvP3", "X-Ops-Authorization-2"=>"v/r7XAMQnzDa/9F221YNIRYVGrtRGLgNwz4upzOeh1sE | |
NzPPOg2kbw+2hnxw", "X-Ops-Authorization-3"=>"1AnNIAYuLcT5WqFy99NW34l1OG8wmvEYF4SGIR7HLacfWzeRZTlEThLMjVnM", "X | |
-Ops-Authorization-4"=>"gJ9k2Mch/4/FUIqsjZplJo0PKL6vyZjnOFGup7HkR2tgaIdJ6ZEX85dTLEvF", "X-Ops-Authorization-5" | |
=>"LchxIfkL/Gl1pz7mqyiO5lDIM7pz5mROhUDg4+NhYOUMtRWO94smM79RbeE0", "X-Ops-Authorization-6"=>"etk+hDT2bxlrjRk6Na | |
BM/SXl1jtypMPJachx3ta3oQ=="} | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-aa56fc9900227fdc83b25654ee316593 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-aa56fc9900227fdc83b25654ee316593?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=AJDc7zGpUgfdi9n0YjZn4w6Borw%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1mtw7tc | |
[Sat, 18 Feb 2012 17:04:12 +0000] INFO: Storing updated cookbooks/openssl/metadata.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:WafA2OcYhpxRXANWdjDmK8jXEkY= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:12Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:12Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"KK+6mkbGZqFNZRJFboFfMHl | |
VR3XqGPqNy4WmgAxgmfTvQgQGEdH4tpmLRKOC", "X-Ops-Authorization-2"=>"fj+lUg5MhIWhE36mPA4IOsuVQ5y29UXAgHg3SwicB/zA | |
yajWAnFY65HJhkjk", "X-Ops-Authorization-3"=>"U27HgcQ97gxt/viq6GGRrBFkvTZc/U2h26dHir9zYLLlmjwH/MYdVApTPXzz", "X | |
-Ops-Authorization-4"=>"byWOIIb+HfPu12Atv9umHXXNLk6pJgyDnl64SANHh44nWx2pxGLEOTKPpjfJ", "X-Ops-Authorization-5" | |
=>"QpoLWLH10pojiQHSdSgWgGmp0c8NGX8NlM0IYfh8LtJUj1P36QuPF6vvnLOw", "X-Ops-Authorization-6"=>"Rc+suQMzo8Dbm/b76P | |
wXynjzLksss63qoFSQkm1TPQ=="} | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-952c568d3a52988f8610f62fcfc0397e | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-952c568d3a52988f8610f62fcfc0397e?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=CeOqhhVDZdVunUq6XtMdVM07p7M%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1xbbw1 | |
[Sat, 18 Feb 2012 17:04:12 +0000] INFO: Storing updated cookbooks/openssl/metadata.json in the cache. | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Synchronizing cookbook chef_handler | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:Xmf8Rri284X/9/ktzLTv/9wF4Kk= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:12Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:12Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"rbLYoMCXF1m/puDx55eQLDD | |
w2AuzTFj45wBTiSoXr4hAFD4Jl1ebIq/1tvXX", "X-Ops-Authorization-2"=>"MabC1E5+C8Wl/ONNfdpGBQ+iN6/NII410jVU4hxNhydn | |
0aJiN6/PDwUncS7z", "X-Ops-Authorization-3"=>"5YO57sGaufHknUoSzV+Zzha8ppXkwXcD5eSfJYz7Eru/zk8Wd/RvOyrnj1vC", "X | |
-Ops-Authorization-4"=>"bvQMsqtnLCws8oaEMQjE5CslQF1I61hhf9Yc7/FYNo2RFI5+QebjUePSnyxA", "X-Ops-Authorization-5" | |
=>"RgkdKvs2eXb7JlTF5jdVDGWPdde8QIqNlM4KrgN5RRJmpAtSi5MbaOEKejRN", "X-Ops-Authorization-6"=>"3o7ZL2qWxRmhhl+Ezl | |
5gbJsm68oazU+ItMm5w7a4qA=="} | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-64fd35146bb4042839800decca808b97 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-64fd35146bb4042839800decca808b97?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=uOT4JfToaKkO0%2BwRe0%2BV8OuRZLA%3D to tempfile C:/User | |
s/ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1glup30 | |
[Sat, 18 Feb 2012 17:04:12 +0000] INFO: Storing updated cookbooks/chef_handler/resources/default.rb in the cac | |
he. | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/chef_handler | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/chef_handler/resources | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:ZjFTv+d8zS1TFGS3UVpvdpQKMVs= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:12Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:12Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"XgEf7i34rjrgOhL1lOuuttD | |
lwnrQD7CXmIHJrRgUlrUJJaeQsf3X/s8Fx0hi", "X-Ops-Authorization-2"=>"WG2XACF5Rk2S8fodOayfanCFLF2q+9tadFIwr7Uvvpjj | |
cjmv+dB3iSSltgUn", "X-Ops-Authorization-3"=>"Y6ICY72E9PwJFrBeUBs2K1HltxeVc5xej9U2qysBPzbajKFZ272kUsvhH8W+", "X | |
-Ops-Authorization-4"=>"ec7dUo9haiUlaiWdFFYB3wXzd05FfnMEjaNPn5wS11RsJC6TScSY3pq5Bfey", "X-Ops-Authorization-5" | |
=>"AckDFgJIqhWwlLbtYbYkC2LUfiqyJF4rGadj7N79uMqxJmv9QYjb+STB3X9Z", "X-Ops-Authorization-6"=>"BSNAwnogtJ2TmpVPOY | |
tfikL6WVWwS9KhFXUpEVeuzQ=="} | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-1af403317a8ccf8a6c4f325bcc7e4e04 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-1af403317a8ccf8a6c4f325bcc7e4e04?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=pwUVF9kPSR9PuW0actRYuPgZJuY%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1kk1azu | |
[Sat, 18 Feb 2012 17:04:12 +0000] INFO: Storing updated cookbooks/chef_handler/providers/default.rb in the cac | |
he. | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/chef_handler/providers | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:tSHRz4wX3ZTfuKKP2+owEFJ2/mo= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:12Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:12Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"quYWG0ABD2HFFcOAzxKFQD8 | |
weV33CCfss5r9C4KSA+1QM9RP56ZFfLNUoSiB", "X-Ops-Authorization-2"=>"1urNLiRD45K9L3wER2SCx1RBIdgd9vpUBA0bLP+NLv4g | |
Fr0IzAT6XtNsFwtJ", "X-Ops-Authorization-3"=>"MgQUoj0T907V5FlzyHdgDmLZEaB2QZX+ut2W7I5emkygGg5G66dSq4Batv6X", "X | |
-Ops-Authorization-4"=>"5sJnlpf68rdRZ6xvhZpoHCCKGcEGrAem61q7ZwfQ+G3AklMdY/RuMKZxvWiV", "X-Ops-Authorization-5" | |
=>"4mDdqX+jQNX71rhFIVx8chiu5S0yPIOLy5AiXNmEvefIkkoL2m1PJno6OqCy", "X-Ops-Authorization-6"=>"ZIHWUH96PDfbwlIFqg | |
MbsStQ9ic5KbpQcvlL4aULvA=="} | |
[Sat, 18 Feb 2012 17:04:12 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-b301b2d18594a1e9cc552e2e85a9be96 | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-b301b2d18594a1e9cc552e2e85a9be96?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=jpA%2FLCHxIA6klDnFJYd21LmKhJo%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-193xqfx | |
[Sat, 18 Feb 2012 17:04:13 +0000] INFO: Storing updated cookbooks/chef_handler/recipes/default.rb in the cache | |
. | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/chef_handler/recipes | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:fAD90L5dmuoNZl+DAEkYjIL+psk= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:13Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:13Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"U7Xzg02QVfqAnFWFpiEtADX | |
E129L2eWZWHrbc5SBBaaInF6ZtasWz5+v8lVD", "X-Ops-Authorization-2"=>"EcPWMI0vkPZaY9MlASXbIHLkm0RGcTiQervWw/pemNma | |
hZzIyOiFJi+t5HBb", "X-Ops-Authorization-3"=>"0zHTSbA+QQr2iJaY4Ui1BG/esWN0kvzaNGPVEwOxhwZDgrkCNxnxg1fNI7nV", "X | |
-Ops-Authorization-4"=>"+lQKNHYo/n01QxdCu3upoIhc3muce+PFcS6Hnmup56gRp0472WIXenfApzRm", "X-Ops-Authorization-5" | |
=>"vLF/OstQO+l7ANhJ9qWouewae5/Dm8hKMtaN0eyWyIWXx+oQSwCxQNxCwwnZ", "X-Ops-Authorization-6"=>"++UNffvIburUkVuXP7 | |
KXYjVj/kgcDIZW5Yq5ixoUfA=="} | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-db05ae653e0fedf3c9747fad170612df | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-db05ae653e0fedf3c9747fad170612df?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=JQ4CYRqGsnAXn3oYFl6y8zj%2B7Pc%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-6icwh3 | |
[Sat, 18 Feb 2012 17:04:13 +0000] INFO: Storing updated cookbooks/chef_handler/recipes/json_file.rb in the cac | |
he. | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:tf4bjBY7ycMnhwmxVYMrNsfASJI= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:13Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:13Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"hESKbViGG7ha/v4OAfgC6o8 | |
NYqpYE3BiX6n9qR9LV8tXDMecVi2UxMhLaWWC", "X-Ops-Authorization-2"=>"A8U1Eri+8u/O0jNLSPsGpS0gjGFQmXLmGmio+/bM84oy | |
xKUZqvt/c48topuG", "X-Ops-Authorization-3"=>"w68gT6M+XWooK34KodAV7rG0bHIII9BkfI1L7s/aPA+6B1ERXp7aKaPJDxjb", "X | |
-Ops-Authorization-4"=>"C3ZZwAeDLTayfQVlTTz+BCpzzIub2aOAwlzyinV8Oq9hQmEpyW1pc9/XBXya", "X-Ops-Authorization-5" | |
=>"dIZBP1VaN2CDy6aGGm+wRpeWN+CvOnlvE0sLJzBoPdk8ZBAKLb22aqKajO7o", "X-Ops-Authorization-6"=>"iWvO6GeAVPJokXcR7U | |
GSVJW9m0IJdYrUqSR6LYcgGQ=="} | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-710010283d3560b512263d52f8271aa3 | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-710010283d3560b512263d52f8271aa3?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=GXU8I9HXG9SE02Gm7T5nYg%2FYzjE%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1dqkncz | |
[Sat, 18 Feb 2012 17:04:13 +0000] INFO: Storing updated cookbooks/chef_handler/attributes/default.rb in the ca | |
che. | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/chef_handler/attributes | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:vkkiRzXrfSq68UhzmSjjvj7hO7o= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:13Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:13Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"yHEjqmuGRWRXCIsZez4HKdi | |
k9DgnHjM2PoY0PWB5qz997h/FXHTCKGAkbGbk", "X-Ops-Authorization-2"=>"Q4SdoWS2pwOvGjTfjIcqoC4EiWCu/dRI7wXzDDCmg2Lw | |
0veXEHQMvS3c0oIn", "X-Ops-Authorization-3"=>"EruOg7xiOsH3Yjo2FH/NaoAs7MjJrLzopAlmacLT5f/YaoC/RzHMbrkytLPQ", "X | |
-Ops-Authorization-4"=>"dOUtg+VWjafJSFgnw8zVr5t9WmpemZOcfxiEEwzmk3azMsww8VHhhAGZKpgD", "X-Ops-Authorization-5" | |
=>"Rk1F4bPU/79NFOA4eyHVNXJ4KH9zva7FOkvqrbXjCoy+pXnpU8mCY6DH4zPi", "X-Ops-Authorization-6"=>"UrbZMEK7BbT/FcDvAC | |
gxss/yOHvbRhIho/clj/bqXg=="} | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-e82549ca7a038fa004b8a06b12a13611 | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-e82549ca7a038fa004b8a06b12a13611?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=JE8tRgjz8LezYIB%2Fj%2FahFtZ3anI%3D to tempfile C:/User | |
s/ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1134utf | |
[Sat, 18 Feb 2012 17:04:13 +0000] INFO: Storing updated cookbooks/chef_handler/README.md in the cache. | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:92rljbXTWnw3f4ZvxdmwfNuHANc= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:13Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:13Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"GyFShYkH9EEERL9GXJthn0S | |
sRFUnJnybyczq4KIaPhpYDKJQLFw/bfh+h7Pl", "X-Ops-Authorization-2"=>"g9Ag/mOAbwvCz5pFqVesaEk7iWPWNtm+X9mK7qPzDIz1 | |
nBvoz/Ma/cJhlHcM", "X-Ops-Authorization-3"=>"rrmFtQg+Oilcswcjxm+rv20wR4HUvAAHPJn5sxl8TLvmxWkOScOHoaY89nkT", "X | |
-Ops-Authorization-4"=>"ATbJraEKHNDsLvvjr6hjpmOGVkj0MO0nJ3h+NXbtnZtg1GW/J7FOmNKOhCC5", "X-Ops-Authorization-5" | |
=>"M7II4stVRApKfXsCkKYl0YzsePvTvBA+aHozCE571n4sttRdxSHfqYFXUAA0", "X-Ops-Authorization-6"=>"kKSi6MOi1yk+TzGqEj | |
ctkorQCuV2sfTzysldWa2mrg=="} | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-26ee3eb9b3adceb6e46f344c6618a169 | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-26ee3eb9b3adceb6e46f344c6618a169?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=7f3JoCN3ezOPuoZ5U5QOUKExv%2FU%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1n8oao5 | |
[Sat, 18 Feb 2012 17:04:13 +0000] INFO: Storing updated cookbooks/chef_handler/metadata.rb in the cache. | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:xMi1mnLija/N1qyWnaBN/EUupkw= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:13Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:13Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"CGUDH7qcWKaK4vP0KAesPyg | |
Lci/H1C7IAlrp0/RPrm+zQUl8zkHJ0FuHsEk6", "X-Ops-Authorization-2"=>"hxPjV62iDpbsjdfI2XK/xPBrPbLylelHlylKHjgVNFnV | |
pfqqVTTLudL0L2/5", "X-Ops-Authorization-3"=>"HkczrTxnjVzg8ny8+5gNrvfT3qB4iq9GBTSt77YjCFRTSQqQ7uLQ8NyR3R5t", "X | |
-Ops-Authorization-4"=>"X431TmkkdCFkvU4NgqvsR205e3ca4XPbQb/7/JJs9kZD7gsrDo8iDwk6HnbS", "X-Ops-Authorization-5" | |
=>"N6hOeN13hRhRROl2Drka+63EjEiOZ6288a6eZCa8XaApdW1Nc/ZG2l8JvpzS", "X-Ops-Authorization-6"=>"rvwy3GNN0i+8gXrbj8 | |
GsmYo8J4Bmg9UrZd1HZlrb/A=="} | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-1abcd0bf107234191c48b4121002aab5 | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-1abcd0bf107234191c48b4121002aab5?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=2PvrKHR%2FudYDyoAz15QFK6RmsMw%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1sehjkz | |
[Sat, 18 Feb 2012 17:04:13 +0000] INFO: Storing updated cookbooks/chef_handler/metadata.json in the cache. | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Loading cookbook sql_server's library file: c:/chef/cache/cookbooks/s | |
ql_server/libraries/helper.rb | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Loading cookbook windows's library file: c:/chef/cache/cookbooks/wind | |
ows/libraries/feature_base.rb | |
[Sat, 18 Feb 2012 17:04:13 +0000] DEBUG: Loading cookbook windows's library file: c:/chef/cache/cookbooks/wind | |
ows/libraries/registry_helper.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's library file: c:/chef/cache/cookbooks/wind | |
ows/libraries/helper.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's library file: c:/chef/cache/cookbooks/wind | |
ows/libraries/windows_privileged.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's library file: c:/chef/cache/cookbooks/wind | |
ows/libraries/version.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's library file: c:/chef/cache/cookbooks/wind | |
ows/libraries/ruby_19_patches.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook openssl's library file: c:/chef/cache/cookbooks/open | |
ssl/libraries/secure_password.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's providers from c:/chef/cache/cookbooks/win | |
dows/providers/registry.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/providers/registry | |
.rb into a provider named windows_registry defined in Chef::Provider::WindowsRegistry | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's providers from c:/chef/cache/cookbooks/win | |
dows/providers/auto_run.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/providers/auto_run | |
.rb into a provider named windows_auto_run defined in Chef::Provider::WindowsAutoRun | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's providers from c:/chef/cache/cookbooks/win | |
dows/providers/path.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/providers/path.rb | |
into a provider named windows_path defined in Chef::Provider::WindowsPath | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's providers from c:/chef/cache/cookbooks/win | |
dows/providers/feature_servermanagercmd.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/providers/feature_ | |
servermanagercmd.rb into a provider named windows_feature_servermanagercmd defined in Chef::Provider::WindowsF | |
eatureServermanagercmd | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's providers from c:/chef/cache/cookbooks/win | |
dows/providers/zipfile.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/providers/zipfile. | |
rb into a provider named windows_zipfile defined in Chef::Provider::WindowsZipfile | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's providers from c:/chef/cache/cookbooks/win | |
dows/providers/package.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/providers/package. | |
rb into a provider named windows_package defined in Chef::Provider::WindowsPackage | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's providers from c:/chef/cache/cookbooks/win | |
dows/providers/batch.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/providers/batch.rb | |
into a provider named windows_batch defined in Chef::Provider::WindowsBatch | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's providers from c:/chef/cache/cookbooks/win | |
dows/providers/feature_dism.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/providers/feature_ | |
dism.rb into a provider named windows_feature_dism defined in Chef::Provider::WindowsFeatureDism | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's providers from c:/chef/cache/cookbooks/win | |
dows/providers/reboot.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/providers/reboot.r | |
b into a provider named windows_reboot defined in Chef::Provider::WindowsReboot | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook chef_handler's providers from c:/chef/cache/cookbook | |
s/chef_handler/providers/default.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/chef_handler/providers/def | |
ault.rb into a provider named chef_handler defined in Chef::Provider::ChefHandler | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's resources from c:/chef/cache/cookbooks/win | |
dows/resources/zipfile.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/resources/zipfile. | |
rb into a resource named windows_zipfile defined in Chef::Resource::WindowsZipfile | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's resources from c:/chef/cache/cookbooks/win | |
dows/resources/package.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/resources/package. | |
rb into a resource named windows_package defined in Chef::Resource::WindowsPackage | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's resources from c:/chef/cache/cookbooks/win | |
dows/resources/registry.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/resources/registry | |
.rb into a resource named windows_registry defined in Chef::Resource::WindowsRegistry | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's resources from c:/chef/cache/cookbooks/win | |
dows/resources/auto_run.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/resources/auto_run | |
.rb into a resource named windows_auto_run defined in Chef::Resource::WindowsAutoRun | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's resources from c:/chef/cache/cookbooks/win | |
dows/resources/reboot.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/resources/reboot.r | |
b into a resource named windows_reboot defined in Chef::Resource::WindowsReboot | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's resources from c:/chef/cache/cookbooks/win | |
dows/resources/path.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/resources/path.rb | |
into a resource named windows_path defined in Chef::Resource::WindowsPath | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's resources from c:/chef/cache/cookbooks/win | |
dows/resources/batch.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/resources/batch.rb | |
into a resource named windows_batch defined in Chef::Resource::WindowsBatch | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook windows's resources from c:/chef/cache/cookbooks/win | |
dows/resources/feature.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/windows/resources/feature. | |
rb into a resource named windows_feature defined in Chef::Resource::WindowsFeature | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading cookbook chef_handler's resources from c:/chef/cache/cookbook | |
s/chef_handler/resources/default.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loaded contents of c:/chef/cache/cookbooks/chef_handler/resources/def | |
ault.rb into a resource named chef_handler defined in Chef::Resource::ChefHandler | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Node ip-0A7A5A94 loading cookbook sql_server's attribute file c:/chef | |
/cache/cookbooks/sql_server/attributes/client.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Node ip-0A7A5A94 loading cookbook sql_server's attribute file c:/chef | |
/cache/cookbooks/sql_server/attributes/default.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Node ip-0A7A5A94 loading cookbook sql_server's attribute file c:/chef | |
/cache/cookbooks/sql_server/attributes/server.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Node ip-0A7A5A94 loading cookbook windows's attribute file c:/chef/ca | |
che/cookbooks/windows/attributes/default.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Node ip-0A7A5A94 loading cookbook chef_handler's attribute file c:/ch | |
ef/cache/cookbooks/chef_handler/attributes/default.rb | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading Recipe openssl via include_recipe | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Found recipe default in cookbook openssl | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading Recipe windows via include_recipe | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Found recipe default in cookbook windows | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Loading Recipe sql_server::server via include_recipe | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Found recipe server in cookbook sql_server | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: String to sign: 'Method:PUT | |
Hashed Path:XPKIyzaDmGFyGStenynpzDhBAzI= | |
X-Ops-Content-Hash:5oEH5aIuJoc4vKcGAl+RdoRXHiI= | |
X-Ops-Timestamp:2012-02-18T17:04:14Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:14Z", "X-Ops-Content-Hash"=>"5oEH5aIuJoc4vKcGAl+RdoRXHiI=", "X-Ops-Authorization-1"=>"agMlra/rIXAShN6Zbj+nCUz | |
xkDgx7YWKVkynQ1ElEmT7Ztc0DY0NE4y9lZo3", "X-Ops-Authorization-2"=>"2tqCN2WL4Y47a9nqdb/IKomwPUpYaUzzHazkbmy0fa0u | |
Nf1Jib+Y6SgrVcJJ", "X-Ops-Authorization-3"=>"u747LdD2WDlUlm2Elcksdj/1zMXZqAIpfCnC/Q8D47LKw9MceYBqWZm2xj0T", "X | |
-Ops-Authorization-4"=>"XxjiCaI2FEP/os0JKBQih5bxBumHEgVbdJZ7DHHpd7s2L7iJbX4TaNr+4HOq", "X-Ops-Authorization-5" | |
=>"FgtsAiXHq2rCtvxD+nmUauZZPo6PUJ9mnkcYIAT6PyHgIaHHuvQOJrFHH1AJ", "X-Ops-Authorization-6"=>"BXopOYDza4EtaY9kqc | |
+qLUSKDENTi3P+j7cmqR4VIg=="} | |
[Sat, 18 Feb 2012 17:04:14 +0000] DEBUG: Sending HTTP Request via PUT to api.opscode.com:443/organizations/bra | |
ttyredhead/nodes/ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Setting gem_package[win32-service] to the state of the prior gem_pack | |
age[win32-service] | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Loading Recipe sql_server::client via include_recipe | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Found recipe client in cookbook sql_server | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Converging node ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Processing gem_package[win32-api] on ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:15 +0000] INFO: Processing gem_package[win32-api] action install (windows::default lin | |
e /chef/cache/cookbooks/windows/recipes/default.rb) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: gem_package[win32-api] found installed gem win32-api version 1.4.8 ma | |
tching win32-api (>= 0) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: gem_package[win32-api] is already installed - nothing to do | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Processing gem_package[win32-service] on ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:15 +0000] INFO: Processing gem_package[win32-service] action install (windows::default | |
line /chef/cache/cookbooks/windows/recipes/default.rb) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: gem_package[win32-service] found installed gem win32-service version | |
0.7.2 matching win32-service (>= 0) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: gem_package[win32-service] is already installed - nothing to do | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Processing gem_package[windows-api] on ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:15 +0000] INFO: Processing gem_package[windows-api] action install (windows::default l | |
ine /chef/cache/cookbooks/windows/recipes/default.rb) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: gem_package[windows-api] found installed gem windows-api version 0.4. | |
0 matching windows-api (>= 0) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: gem_package[windows-api] is already installed - nothing to do | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Processing gem_package[windows-pr] on ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:15 +0000] INFO: Processing gem_package[windows-pr] action install (windows::default li | |
ne /chef/cache/cookbooks/windows/recipes/default.rb) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: gem_package[windows-pr] found installed gem windows-pr version 1.2.1 | |
matching windows-pr (>= 0) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: gem_package[windows-pr] is already installed - nothing to do | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Processing gem_package[win32-dir] on ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:15 +0000] INFO: Processing gem_package[win32-dir] action install (windows::default lin | |
e /chef/cache/cookbooks/windows/recipes/default.rb) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: gem_package[win32-dir] found installed gem win32-dir version 0.3.7 ma | |
tching win32-dir (>= 0) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: gem_package[win32-dir] is already installed - nothing to do | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Processing gem_package[win32-event] on ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:15 +0000] INFO: Processing gem_package[win32-event] action install (windows::default l | |
ine /chef/cache/cookbooks/windows/recipes/default.rb) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: gem_package[win32-event] found installed gem win32-event version 0.5. | |
2 matching win32-event (>= 0) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: gem_package[win32-event] is already installed - nothing to do | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Processing gem_package[win32-mutex] on ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:15 +0000] INFO: Processing gem_package[win32-mutex] action install (windows::default l | |
ine /chef/cache/cookbooks/windows/recipes/default.rb) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: gem_package[win32-mutex] found installed gem win32-mutex version 0.3. | |
1 matching win32-mutex (>= 0) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: gem_package[win32-mutex] is already installed - nothing to do | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Processing template[c:\chef\cache\ConfigurationFile.ini] on ip-0A7A5A | |
94 | |
[Sat, 18 Feb 2012 17:04:15 +0000] INFO: Processing template[c:\chef\cache\ConfigurationFile.ini] action create | |
(sql_server::server line /chef/cache/cookbooks/sql_server/recipes/server.rb) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:mj4LGlsgJ4QaeQR91aF9QFFwRiI= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:04:15Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:04 | |
:15Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"GF6iZ+sfJA8wKi1GqfRllRC | |
i6Z4Sr27zafqbAlGAQiQhvtY/te0Up/9tofIP", "X-Ops-Authorization-2"=>"CUNmHQAYGWI2uGV/okXkO3iITKIayHhHGvpSAdskD3aD | |
4V5SVmKc6SgiVyDp", "X-Ops-Authorization-3"=>"uNn74SgZdSa4qPg1RB+qsRs8D+hj3uNwCU+ilu07dR/aI/sGQ8SQMyM7DFTN", "X | |
-Ops-Authorization-4"=>"/N5Rb1TsHjuEZskJEDmaO5/EKmvXmTOIA8WwzS6EKNAQMm0/Tzvl1EnY50ks", "X-Ops-Authorization-5" | |
=>"JTHYinkKZ2nGGz3/aHP6yuJgGg/kIFFfNmxGmqwgGZSzSSR3fWsFRHBbBrgf", "X-Ops-Authorization-6"=>"7v5ej42hVTzar14R4x | |
ZdtPU/kPQv2VkBZe8gH8jWTg=="} | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-49d6eb820a2e2ca8069c834326d04aac | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-49d6eb820a2e2ca8069c834326d04aac?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=1wHxEeNrVXtltRARhCERf5i%2BWLU%3D to tempfile C:/Users/ | |
ADMINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-1jzne4k | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Storing updated cookbooks/sql_server/templates/default/ConfigurationF | |
ile.ini.erb in the cache. | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/sql_server/templates | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Creating directory c:/chef/cache/cookbooks/sql_server/templates/defau | |
lt | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Current content's checksum: | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Rendered content's checksum: 43d61d77f6eff56ab666430d2c42f0b36d01804c | |
fef17ceac9b8519500571498 | |
[Sat, 18 Feb 2012 17:04:15 +0000] INFO: template[c:/chef/cache/ConfigurationFile.ini] updated content | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Processing windows_package[Microsoft SQL Server 2008 R2 (32-bit)] on | |
ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:04:15 +0000] INFO: Processing windows_package[Microsoft SQL Server 2008 R2 (32-bit)] acti | |
on install (sql_server::server line /chef/cache/cookbooks/sql_server/recipes/server.rb) | |
[Sat, 18 Feb 2012 17:04:15 +0000] INFO: Installing windows_package[Microsoft SQL Server 2008 R2 (32-bit)] vers | |
ion latest | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Processing windows_package[Microsoft SQL Server 2008 R2 (32-bit)] as | |
a custom installer. | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Caching a copy of file http://care.dlservice.microsoft.com/dl/downloa | |
d/5/1/A/51A153F6-6B08-4F94-A7B2-BA1AD482BC75/SQLEXPR32_x86_ENU.exe at c:/chef/cache/SQLEXPR32_x86_ENU.exe | |
[Sat, 18 Feb 2012 17:04:15 +0000] INFO: Processing remote_file[c:/chef/cache/SQLEXPR32_x86_ENU.exe] action cre | |
ate (dynamically defined) | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: remote_file[c:/chef/cache/SQLEXPR32_x86_ENU.exe] checking for changes | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Sending HTTP Request via GET to care.dlservice.microsoft.com:80/dl/do | |
wnload/5/1/A/51A153F6-6B08-4F94-A7B2-BA1AD482BC75/SQLEXPR32_x86_ENU.exe | |
[Sat, 18 Feb 2012 17:04:15 +0000] DEBUG: Streaming download from http://care.dlservice.microsoft.com/dl/downlo | |
ad/5/1/A/51A153F6-6B08-4F94-A7B2-BA1AD482BC75/SQLEXPR32_x86_ENU.exe to tempfile C:/Users/ADMINI~1/AppData/Loca | |
l/Temp/2/chef-rest20120218-3744-1q8sb61 | |
[Sat, 18 Feb 2012 17:04:38 +0000] DEBUG: remote_file[c:/chef/cache/SQLEXPR32_x86_ENU.exe] checking for file ex | |
istence of c:/chef/cache/SQLEXPR32_x86_ENU.exe | |
[Sat, 18 Feb 2012 17:04:38 +0000] DEBUG: remote_file[c:/chef/cache/SQLEXPR32_x86_ENU.exe] creating c:/chef/cac | |
he/SQLEXPR32_x86_ENU.exe | |
[Sat, 18 Feb 2012 17:04:39 +0000] INFO: remote_file[c:/chef/cache/SQLEXPR32_x86_ENU.exe] updated | |
[Sat, 18 Feb 2012 17:04:39 +0000] INFO: remote_file[c:/chef/cache/SQLEXPR32_x86_ENU.exe] mode changed to 755 | |
[Sat, 18 Feb 2012 17:04:39 +0000] INFO: Starting installation...this could take awhile. | |
[Sat, 18 Feb 2012 17:04:39 +0000] DEBUG: sh(start /wait c:\chef\cache\SQLEXPR32_x86_ENU.exe /q /ConfigurationF | |
ile=c:\chef\cache\ConfigurationFile.ini) | |
[Sat, 18 Feb 2012 17:08:30 +0000] DEBUG: Processing gem_package[win32-service] on ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:08:30 +0000] INFO: Processing gem_package[win32-service] action install (sql_server::serv | |
er line /chef/cache/cookbooks/sql_server/recipes/server.rb) | |
[Sat, 18 Feb 2012 17:08:30 +0000] DEBUG: gem_package[win32-service] found installed gem win32-service version | |
0.7.2 matching win32-service (>= 0) | |
[Sat, 18 Feb 2012 17:08:30 +0000] DEBUG: gem_package[win32-service] is already installed - nothing to do | |
[Sat, 18 Feb 2012 17:08:30 +0000] DEBUG: Processing template[C:\Program Files\Microsoft SQL Server/restart.rb] | |
on ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:08:30 +0000] INFO: Processing template[C:\Program Files\Microsoft SQL Server/restart.rb] | |
action create (sql_server::server line /chef/cache/cookbooks/sql_server/recipes/server.rb) | |
[Sat, 18 Feb 2012 17:08:30 +0000] DEBUG: Signing the request as ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:08:30 +0000] DEBUG: String to sign: 'Method:GET | |
Hashed Path:1mB1GeD37EqS1X274jgdtQrjA2c= | |
X-Ops-Content-Hash:2jmj7l5rSw0yVb/vlWAYkK/YBwk= | |
X-Ops-Timestamp:2012-02-18T17:08:30Z | |
X-Ops-UserId:ip-0A7A5A94' | |
Header hash: {"X-Ops-Sign"=>"version=1.0", "X-Ops-Userid"=>"ip-0A7A5A94", "X-Ops-Timestamp"=>"2012-02-18T17:08 | |
:30Z", "X-Ops-Content-Hash"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-Ops-Authorization-1"=>"eJxks3m/NGTI7itebMrg5P+ | |
kF/PPzomSjTCYRti8Jf2ObWzYYr4UA3wnlbb1", "X-Ops-Authorization-2"=>"HYY7Elos32Rdyuw/ZKwqxHr6DaDLXOERLVrndmF4z3ri | |
ZO93ESw8czsxEkxN", "X-Ops-Authorization-3"=>"8PUnVpLdHxE7HYR8tf6CCU78HAoYdULXHvY7twYN1MBJr2FWwcKpO0CTUr+z", "X | |
-Ops-Authorization-4"=>"H6mkx1cezhg5dnePK14k2Vksf1ftyb2YAor2jORHSg9qPQT39tJ28RTkUZcU", "X-Ops-Authorization-5" | |
=>"egsV54rSWBTSDe9fs1dIalIEvgXTKQIdRNDkB6Y+hZBcb1pxM8RRXkonw73x", "X-Ops-Authorization-6"=>"O3Lnz75pMXhVrBuwMf | |
VBKUu3SQ4MWsERHBoJHCrivQ=="} | |
[Sat, 18 Feb 2012 17:08:30 +0000] DEBUG: Sending HTTP Request via GET to s3.amazonaws.com:443/opscode-platform | |
-production-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-48df9f4d2475994d70b79f24d695c7f4 | |
[Sat, 18 Feb 2012 17:08:30 +0000] DEBUG: Streaming download from https://s3.amazonaws.com/opscode-platform-pro | |
duction-data/organization-5beb2e18f5854d1a90067d55bcbe98d8/checksum-48df9f4d2475994d70b79f24d695c7f4?AWSAccess | |
KeyId=AKIAJOZTD2N26S7W6APA&Expires=1329588248&Signature=DDSK9ApXBd1fuuyoqylQXuNaNm4%3D to tempfile C:/Users/AD | |
MINI~1/AppData/Local/Temp/2/chef-rest20120218-3744-o8ai96 | |
[Sat, 18 Feb 2012 17:08:30 +0000] DEBUG: Storing updated cookbooks/sql_server/templates/default/restart.rb.erb | |
in the cache. | |
[Sat, 18 Feb 2012 17:08:30 +0000] DEBUG: Current content's checksum: | |
[Sat, 18 Feb 2012 17:08:30 +0000] DEBUG: Rendered content's checksum: b792f32148f7828a923e8a01e9fba12a56e73f0c | |
a52fb59cfd2ba671ad0e533a | |
[Sat, 18 Feb 2012 17:08:30 +0000] INFO: template[C:/Program Files/Microsoft SQL Server/restart.rb] updated con | |
tent | |
[Sat, 18 Feb 2012 17:08:30 +0000] DEBUG: Processing service[MSSQL$SQLEXPRESS] on ip-0A7A5A94 | |
[Sat, 18 Feb 2012 17:08:30 +0000] INFO: Processing service[MSSQL$SQLEXPRESS] action nothing (sql_server::serve | |
r line /chef/cache/cookbooks/sql_server/recipes/server.rb) | |
[Sat, 18 Feb 2012 17:08:30 +0000] ERROR: service[MSSQL$SQLEXPRESS] (sql_server::server line /chef/cache/cookbo | |
oks/sql_server/recipes/server.rb) has had an error | |
[Sat, 18 Feb 2012 17:08:30 +0000] ERROR: service[MSSQL$SQLEXPRESS] (c:/chef/cache/cookbooks/sql_server/recipes | |
/server.rb:61:in `from_file') had an error: | |
service[MSSQL$SQLEXPRESS] (sql_server::server line /chef/cache/cookbooks/sql_server/recipes/server.rb) had an | |
error: Win32::Service::Error: The specified service does not exist as an installed service. | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/win32-service-0.7.2/lib/win32/service.rb:962:in `status' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/provider/service/windows.rb:133:in `cur | |
rent_state' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/provider/service/windows.rb:35:in `load | |
_current_resource' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource.rb:439:in `run_action' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/runner.rb:45:in `run_action' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/runner.rb:81:in `block (2 levels) in co | |
nverge' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/runner.rb:81:in `each' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/runner.rb:81:in `block in converge' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection.rb:94:in `block in | |
execute_each_resource' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection/stepable_iterator.r | |
b:116:in `call' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection/stepable_iterator.r | |
b:116:in `call_iterator_block' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection/stepable_iterator.r | |
b:85:in `step' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection/stepable_iterator.r | |
b:104:in `iterate' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection/stepable_iterator.r | |
b:55:in `each_with_index' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection.rb:92:in `execute_e | |
ach_resource' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/runner.rb:76:in `converge' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/client.rb:312:in `converge' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/client.rb:160:in `run' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:239:in `block in | |
run_application' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:229:in `loop' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:229:in `run_appli | |
cation' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application.rb:67:in `run' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/bin/chef-client:26:in `<top (required)>' | |
C:/opscode/chef/bin/chef-client:19:in `load' | |
C:/opscode/chef/bin/chef-client:19:in `<main>' | |
[Sat, 18 Feb 2012 17:08:30 +0000] ERROR: Running exception handlers | |
[Sat, 18 Feb 2012 17:08:30 +0000] FATAL: Saving node information to c:/chef/cache/failed-run-data.json | |
[Sat, 18 Feb 2012 17:08:30 +0000] ERROR: Exception handlers complete | |
[Sat, 18 Feb 2012 17:08:30 +0000] DEBUG: Re-raising exception: Win32::Service::Error - service[MSSQL$SQLEXPRES | |
S] (sql_server::server line /chef/cache/cookbooks/sql_server/recipes/server.rb) had an error: Win32::Service:: | |
Error: The specified service does not exist as an installed service. | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/win32-service-0.7.2/lib/win32/service.rb:962:in `status' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/provider/service/windows.rb:133:in `c | |
urrent_state' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/provider/service/windows.rb:35:in `lo | |
ad_current_resource' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource.rb:439:in `run_action' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/runner.rb:45:in `run_action' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/runner.rb:81:in `block (2 levels) in | |
converge' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/runner.rb:81:in `each' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/runner.rb:81:in `block in converge' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection.rb:94:in `block i | |
n execute_each_resource' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection/stepable_iterator | |
.rb:116:in `call' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection/stepable_iterator | |
.rb:116:in `call_iterator_block' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection/stepable_iterator | |
.rb:85:in `step' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection/stepable_iterator | |
.rb:104:in `iterate' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection/stepable_iterator | |
.rb:55:in `each_with_index' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection.rb:92:in `execute | |
_each_resource' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/runner.rb:76:in `converge' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/client.rb:312:in `converge' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/client.rb:160:in `run' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:239:in `block i | |
n run_application' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:229:in `loop' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:229:in `run_app | |
lication' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application.rb:67:in `run' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/bin/chef-client:26:in `<top (required)>' | |
C:/opscode/chef/bin/chef-client:19:in `load' | |
C:/opscode/chef/bin/chef-client:19:in `<main>' | |
[Sat, 18 Feb 2012 17:08:30 +0000] FATAL: Stacktrace dumped to c:/chef/cache/chef-stacktrace.out | |
[Sat, 18 Feb 2012 17:08:30 +0000] DEBUG: Win32::Service::Error: service[MSSQL$SQLEXPRESS] (sql_server::server | |
line /chef/cache/cookbooks/sql_server/recipes/server.rb) had an error: Win32::Service::Error: The specified se | |
rvice does not exist as an installed service. | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/win32-service-0.7.2/lib/win32/service.rb:962:in `status' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/provider/service/windows.rb:133:in `cur | |
rent_state' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/provider/service/windows.rb:35:in `load | |
_current_resource' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource.rb:439:in `run_action' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/runner.rb:45:in `run_action' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/runner.rb:81:in `block (2 levels) in co | |
nverge' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/runner.rb:81:in `each' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/runner.rb:81:in `block in converge' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection.rb:94:in `block in | |
execute_each_resource' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection/stepable_iterator.r | |
b:116:in `call' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection/stepable_iterator.r | |
b:116:in `call_iterator_block' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection/stepable_iterator.r | |
b:85:in `step' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection/stepable_iterator.r | |
b:104:in `iterate' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection/stepable_iterator.r | |
b:55:in `each_with_index' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/resource_collection.rb:92:in `execute_e | |
ach_resource' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/runner.rb:76:in `converge' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/client.rb:312:in `converge' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/client.rb:160:in `run' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:239:in `block in | |
run_application' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:229:in `loop' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application/client.rb:229:in `run_appli | |
cation' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/lib/chef/application.rb:67:in `run' | |
C:/opscode/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-0.10.8/bin/chef-client:26:in `<top (required)>' | |
C:/opscode/chef/bin/chef-client:19:in `load' | |
C:/opscode/chef/bin/chef-client:19:in `<main>' | |
[Sat, 18 Feb 2012 17:08:30 +0000] FATAL: Win32::Service::Error: service[MSSQL$SQLEXPRESS] (sql_server::server | |
line /chef/cache/cookbooks/sql_server/recipes/server.rb) had an error: Win32::Service::Error: The specified se | |
rvice does not exist as an installed service. | |
c:\chef>012 17:08:30 +0000] FATAL: Win32::Service::Error: service[MSSQL$SQLEXPRESS] (sql_server::server | |
line /chef/cache/cookbooks/sql_server/recipes/server.rb) had an error: Win32::Service::Error: The specified se | |
rvice does not exist as an installed service. | |
c:\chef> |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment