# # Original knife-windows author:: Seth Chisamore () # Copyright:: Copyright (c) 2011-2016 Chef Software, Inc. # License:: Apache License, Version 2.0 # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # require 'chef/knife/winops_bootstrap_windows_base' require 'chef/knife/winops_winrm' require 'chef/knife/winops_winrm_base' require 'chef/knife/winops_winrm_knife_base' class Chef class Knife class BootstrapWindowsWinRM < Bootstrap include Chef::Knife::BootstrapWindowsCore include Chef::Knife::WinrmCore include Chef::Knife::WinrmCommandCommon deps do require 'chef/knife/winops_core/windows_bootstrap_context' require 'chef/json_compat' require 'tempfile' Chef::Knife::Winrm.load_deps end banner 'knife bootstrap windows winrm FQDN (options)' def run validate_name_args! if (Chef::Config[:validation_key] && !File.exist?(File.expand_path(Chef::Config[:validation_key]))) if !negotiate_auth? && !(locate_config_value(:winrm_transport) == 'ssl') ui.error('Validatorless bootstrap over unsecure winrm channels could expose your key to network sniffing') exit 1 end end unless locate_config_value(:winrm_shell) == :cmd ui.warn("The cmd shell is the only valid winrm-shell for 'knife bootstrap windows winrm'. Switching to the cmd shell.") config[:winrm_shell] = :cmd end config[:manual] = true configure_session bootstrap end protected def wait_for_remote_response(wait_max_minutes) wait_max_seconds = wait_max_minutes * 60 retry_interval_seconds = 10 retries_left = wait_max_seconds / retry_interval_seconds print(ui.color("\nWaiting for remote response before bootstrap", :magenta)) wait_start_time = Time.now begin print(".") # Return status of the command is non-zero, typically nil, # for our simple echo command in cases where run_command # swallows the exception, such as 401's. Treat such cases # the same as the case where we encounter an exception. status = run_command("echo . & echo Response received.") raise RuntimeError, 'Command execution failed.' if status != 0 ui.info(ui.color("Remote node responded after #{elapsed_time_in_minutes(wait_start_time)} minutes.", :magenta)) return rescue Errno::ECONNREFUSED => e ui.error("Connection refused connecting to #{locate_config_value(:server_name)}:#{locate_config_value(:winrm_port)}.") raise rescue Exception => e retries_left -= 1 if retries_left <= 0 || (elapsed_time_in_minutes(wait_start_time) > wait_max_minutes) ui.error("No response received from remote node after #{elapsed_time_in_minutes(wait_start_time)} minutes, giving up.") ui.error("Exception: #{e.message}") raise end print '.' sleep retry_interval_seconds retry end end def elapsed_time_in_minutes(start_time) ((Time.now - start_time) / 60).round(2) end end end end