Commit Graph

61 Commits

Author SHA1 Message Date
Sander van Harmelen 0e422737ba Fix and refactor the Chef provisioner
The tests did pass, but that was because they only tested part of the changes. By using the `schema.TestResourceDataRaw` function the schema and config are better tested and so they pointed out a problem with the schema of the Chef provisioner.

The `Elem` fields did not have a `*schema.Schema` but a `schema.Schema` and in an `Elem` schema only the `Type` field may (and must) be set. Any other fields like `Optional` are not allowed here.

Next to fixing that problem I also did a little refactoring and cleaning up. Mainly making the `ProvisionerS` private (`provisioner`) and removing the deprecated fields.
2017-05-19 21:05:21 +02:00
Seth Vargo 7110d15f19
Add HCL syntax highlighting for everything but providers 2017-04-06 14:08:39 -04:00
Martin Atkins f57cf5cc05 website: note that destroy provisioners can't run if resource removed
This addresses (via documentation) the issue raised in #13097.
2017-04-04 13:37:37 -07:00
George Christou 61277c0dbd website/docs: Run `terraform fmt` on code examples (#12075)
* docs/vsphere: Fix code block

* docs: Convert `...` to `# ...` to allow `terraform fmt`ing

* docs: Trim trailing whitespace

* docs: First-pass run of `terraform fmt` on code examples
2017-02-19 00:48:50 +02:00
Mitchell Hashimoto 3a1140951b
website: document destroy provisioners 2017-01-20 23:21:29 -08:00
Kyle Persohn b300cac97b provisioner/chef: Support named run-lists for Policyfiles (#11215)
* provisioner/chef: Support named run-lists for Policyfiles

Add an optional argument for overriding the Chef Client's initial
run with a named run-list specified by the Policyfile. This is useful
for bootstrapping a node with a one-time setup recipe that deviates
from a policy's normal run-list.

* Update chef client cmd building per review feedback.
2017-01-19 09:03:45 +01:00
Christoph Blecker db423b000c Add documentation for Chef Provisioner Policyfile support
Original feature added in #3329.
Fixes #9013.
2016-12-01 10:43:49 -08:00
James Turnbull 41b91f365d website: Quick pass over some docs pages (#9705)
* Pass over the Fastly docs

* Pass over the file provisioner docs
2016-10-31 08:52:27 +00:00
James Bardin 647d682348 Remove key_file from docs as well 2016-10-12 14:48:15 -04:00
James Nugent e23fc50661 Merge pull request #9300 from jamtur01/patch-10
Updates to the Connection docs
2016-10-10 20:25:02 -04:00
James Nugent 2f431d9a16 Merge pull request #9299 from jamtur01/patch-9
Some edits to the Chef provisioner page
2016-10-10 20:23:17 -04:00
James Turnbull 467d52f964 Fixed 404'ed link (#9295)
* Fixed 404'ed link

Fixed link and some minor formatting.

* Pointed to actual provider

* Typo'ed link :(
2016-10-09 18:19:55 +02:00
James Turnbull 28995d480c Updates to the Connection docs
1. Updated formatting.
2. Updated some grammar and structure.
2016-10-09 11:42:43 -04:00
James Turnbull 27c3e9a107 Some edits to the Chef provisioner page
1. Fixed some formatting issues.
2. Fixed some grammar and structure issues.
2016-10-09 10:46:31 -04:00
Sander van Harmelen 59b67efd8a provisioner/chef: make docs a little more explicit (#9159) 2016-10-01 09:43:23 +02:00
Sam Dunne 628743b24c Add ability to skip chef registration
This change allows a user to skip the bootstrap stage for a machine.
2016-10-01 00:49:39 +02:00
Christoph Blecker 8bbbfcf261 Fix typo in chef provisioner
Typo in example
2016-09-20 09:58:04 -07:00
Sander van Harmelen 968472a63e Support recreating clients and configuring Chef Vaults (#8577)
Fixes #3605 and adds the functionality suggested in PR #7440.

This PR is using a different appraoch that (IMHO) feels cleaner and (even more important) adds support for Windows at the same time.
2016-09-15 14:20:18 +02:00
Stephane Jourdan 8a355a2059 fix typo 2016-09-07 09:16:50 +02:00
James Nugent d31656af91 docs: Clarify note on local provisioners 2016-09-03 15:22:26 -07:00
Jakub Holy 8d0540865f local-exec: the OS doesn't need to be ready
It is not obvious that the resource being created doesn't mean that the OS and system services such as sshd are ready (contrary to `remote-exec`). It is better to make that explicit and same developers like me some headache :-)
2016-09-03 15:21:20 -07:00
jorge.marey 800f7d2e06 Update documentation 2016-07-08 19:34:59 +01:00
Mike Beck 30c2274a20 add a dash to make syntactically correct 2016-06-29 09:27:48 -05:00
David Castillo 12118b6189 Fixed typos in remote.html.markdown and connection.html.markdown. (#6195) 2016-04-15 23:05:49 +01:00
Justin Nauman f8e9a8150a Update null_resource.html.markdown
Fixing example w/ interpolation error.
2016-02-25 09:13:54 -06:00
Sander van Harmelen ac0cbd400e Add `attributes_json` param for consistency
Add `attributes_json` param for both consistency and easier management
of deprecating the old `attributes` param.
2016-02-09 11:11:46 +01:00
Sander van Harmelen 79e2642dab Fix issue #4881
This fixes issue #4881 by adding an option to fetch the Chef SSL
certificates.
2016-02-04 15:31:24 +01:00
Sander van Harmelen da927fcd08 Make the Chef `attributes` param also accept a raw JSON string
See the updated docs for more details and examples, but in short this
enables the `attributes` param from the Chef provisioner to accept a
raw JSON string.

Fixes #3074
Fixes #3572
2016-01-29 18:41:14 +01:00
Sander van Harmelen 71ffb6caa0 Add the option to add arbitrary `client.rb` options
Fixes #3630
2016-01-09 00:42:02 +01:00
Petr Artamonov 84bb5154be corrected value type in documentation 2016-01-08 20:03:22 +01:00
Petr Artamonov 76913703a9 modified to have less code and not to verify incoming string 2016-01-08 20:00:11 +01:00
Petr Artamonov 063abc866c docs updated 2016-01-08 12:23:01 +01:00
Sander van Harmelen c72342eefc Add SSH agent support for Windows
The Windows support is limited to the Pageant SSH authentication agent.
This fixes #3423
2015-12-15 16:39:23 +01:00
Paul Hinze 73ce6d184a chef: read key contents instead of paths
Builds on the work of #3846, shifting the Chef provisioner's
configuration options from `secret_key_path` and `validation_key_path`
over to `secret_key` and `validation_key`.
2015-11-12 16:11:44 -06:00
Paul Hinze 7ffa66d1a5 ssh: accept private key contents instead of path
We've been moving away from config fields expecting file paths that
Terraform will load, instead prefering fields that expect file contents,
leaning on `file()` to do loading from a path.

This helps with consistency and also flexibility - since this makes it
easier to shift sensitive files into environment variables.

Here we add a little helper package to manage the transitional period
for these fields where we support both behaviors.

Also included is the first of several fields being shifted over - SSH
private keys in provisioner connection config.

We're moving to new field names so the behavior is more intuitive, so
instead of `key_file` it's `private_key` now.

Additional field shifts will be included in follow up PRs so they can be
reviewed and discussed individually.
2015-11-12 14:59:14 -06:00
Paul Hinze 7f800f3498 website: docs for null_resource 2015-10-27 15:28:37 -05:00
Daniel Paul Searles fd2d9371e9 A script must have executable permissions.
Why:

* The current example for passing arguments to a local script does not
  include making the uploaded file executable.

This change addresses the need by:

* Add a step to make the uploaded script executable to the example
  showing how to pass arguments to an uploaded script.
2015-10-09 11:27:38 -07:00
Anthony Scalisi 198e1a5186 remove various typos 2015-09-11 11:56:20 -07:00
Joshua Seidel 147efbc52c update markdown 2015-07-09 10:13:54 -04:00
Sander van Harmelen 61517f68b1 Add an `ohai_hints` option to upload hint files
This option takes a list of hints that will be uploaded to the new node
before starting the initial Chef run.
2015-06-25 16:32:36 +02:00
Sander van Harmelen 2690d87d39 Add an option to specifically specify the target OS
Before this option (`os_type`) the provisioner would use the connection
type to determine the targeted OS. When not supplying a value for
`os_type`, it will fall back to the old behaviour, so this is full BC.
2015-06-25 14:29:48 +02:00
Paul Hinze a7cbbbd258 communicator/ssh: bastion host support
* adds `bastion_*` fields to `connection` which add configuration for a
   bastion host
 * if `bastion_host` is set, connect to that host first, then jump
   through it to make the SSH connection to `host`
 * enables SSH Agent forwarding by default
2015-06-22 18:00:18 -05:00
Paul Hinze 44de0996c5 communicator/ssh: switch agent default to true
This changes SSH Agent utilization from opt-in to opt-out, bringing
Terraform in line with the behavior of Packer and the `ssh` command
itself.

But skip SSH agent connections if the SSH_AUTH_SOCK env var doesn't exist,
whcih means there's no agent to connect to.
2015-06-19 17:14:43 -05:00
Sander van Harmelen 0e87980c72 provisioner/chef: small fix in the docs 2015-05-18 16:21:31 +02:00
Sander van Harmelen 11314a3d71 Tweaking a few minor things according to the feedback on GH 2015-05-12 10:37:38 +02:00
Sander van Harmelen c19d92fb67 Refactored quite a few things after review...
Also renamed the provisioner to just `chef` as it’s out intention to
end up with one provisioner for all types of `chef` clients.
2015-05-08 23:25:24 +02:00
Sander van Harmelen 60984b2da2 This commit adds a Chef Client provisioner
The commit is pretty complete and has a tested/working provisioner for
both SSH and WinRM. There are a few tests, but we maybe need another
few to have better coverage. Docs are also included…
2015-05-08 14:54:56 +02:00
Sander van Harmelen 907eee24f2 Updating the docs 2015-05-01 18:50:57 +02:00
Paul Thrasher b7683d1a39 Typo in website docs for remote-exec
Just a simple typo fix.
2015-04-22 15:00:16 -07:00
Mitchell Hashimoto 5f4e2d9b27 website: clarify script args [GH-236] 2015-04-22 09:03:38 +02:00