Created
May 24, 2017 15:38
-
-
Save ctataryn/9e7efb9d609f8c867f4d1cf6f299bc41 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ berks upload -d | |
I, [2017-05-24T10:29:21.244742 #13780] INFO -- : Checking if lockfile is trusted | |
D, [2017-05-24T10:29:21.244742 #13780] DEBUG -- : Checking tprmb (>= 0.0.0) | |
D, [2017-05-24T10:29:21.246742 #13780] DEBUG -- : Using 'chefignore' at 'C:/workspace/chef/cookbooks/tprmb/chefignore' | |
D, [2017-05-24T10:29:21.260742 #13780] DEBUG -- : Detected there is a cached cookbook | |
D, [2017-05-24T10:29:21.261242 #13780] DEBUG -- : Checking transitive dependencies for tprmb (0.1.0) | |
D, [2017-05-24T10:29:21.261242 #13780] DEBUG -- : Checking seven_zip (= 2.0.2) | |
D, [2017-05-24T10:29:21.261742 #13780] DEBUG -- : Checking transitive dependencies for seven_zip (2.0.2) | |
D, [2017-05-24T10:29:21.262242 #13780] DEBUG -- : Already checked - skipping | |
I, [2017-05-24T10:29:21.332742 #13780] INFO -- : Uploading cookbooks | |
D, [2017-05-24T10:29:21.333242 #13780] DEBUG -- : No names given, using all cookbooks | |
I, [2017-05-24T10:29:21.349242 #13780] INFO -- : Starting upload | |
D, [2017-05-24T10:29:21.378742 #13780] DEBUG -- : Uploading ohai (5.1.0) 'C:/Users/ctatar01/.berkshelf/cookbooks/ohai-5.1.0' | |
D, [2017-05-24T10:29:21.406742 #13780] DEBUG -- : ==> performing authenticated Chef request as 'admin' | |
D, [2017-05-24T10:29:21.407242 #13780] DEBUG -- : request env: #<struct Faraday::Env method=:get, body=nil, url=#<Addressable::URI:0x295383c URI:https://default-centos65.vagrantup.com:443/organizations/tprmb/cookbooks/ohai/5.1.0>, request=# | |
<Faraday::RequestOptions (empty)>, request_headers={"Accept"=>"application/json", "Content-Type"=>"application/json", "X-Chef-Version"=>"11.4.0", "User-Agent"=>"Ridley v5.1.0", "X-OPS-SIGN"=>"algorithm=sha1;version=1.0;", "X-OPS-USERID"=>"a | |
dmin", "X-OPS-TIMESTAMP"=>"2017-05-24T15:29:21Z", "X-OPS-CONTENT-HASH"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-OPS-AUTHORIZATION-1"=>"PRXwqfkP/nFlxgqZGnl0e5105GEkM2WaUce0RRgN0Ni8iKTqaYkKX00ue/gP", "X-OPS-AUTHORIZATION-2"=>"E5QjOErIBu1Sp/eswjj3o | |
pOQoWq6SYesXIb4PpVuPH8iFwe0JsNwHt8/XYAS", "X-OPS-AUTHORIZATION-3"=>"R4S0sn8zKgrB4JpRMlXI7gyNrt6ZFMM+4HMhyJSGpWhHNrLpZ9rqMPxDSvk1", "X-OPS-AUTHORIZATION-4"=>"msSZga5XKNKcJPqTuoTK4KO+fLGHK6Cm1KrKAfx1G13SVntOaJiEymYCl7s6", "X-OPS-AUTHORIZATION | |
-5"=>"4KH9qIyTumVlgFqz3/ueGTy6B/wbjKwtrCIodMhsv57mGqeQEKZJ03hu37tb", "X-OPS-AUTHORIZATION-6"=>"bTWvCMDcZIvjdom6ZpG2FwhEwGedbxS3fxo4v2eMNQ==", "HOST"=>"default-centos65.vagrantup.com:443"}, ssl=#<Faraday::SSLOptions cert_store=#<OpenSSL::X50 | |
9::Store:0x50c1ee8 @verify_callback=nil, @error=nil, @error_string=nil, @chain=nil, @time=nil, @_httpclient_cert_store_items=["C:/opscode/chefdk/embedded/ssl/certs/cacert.pem"]>>, parallel_manager=nil, params=nil, response=nil, response_hea | |
ders=nil, status=nil> | |
D, [2017-05-24T10:29:21.448242 #13780] DEBUG -- : ==> handling Chef response | |
D, [2017-05-24T10:29:21.448242 #13780] DEBUG -- : request env: #<struct Faraday::Env method=:get, body="{\"error\":[\"Cannot find a cookbook named ohai with version 5.1.0\"]}", url=#<Addressable::URI:0x295383c URI:https://default-centos65.v | |
agrantup.com:443/organizations/tprmb/cookbooks/ohai/5.1.0>, request=#<Faraday::RequestOptions (empty)>, request_headers={"Accept"=>"application/json", "Content-Type"=>"application/json", "X-Chef-Version"=>"11.4.0", "User-Agent"=>"Ridley v5. | |
1.0", "X-OPS-SIGN"=>"algorithm=sha1;version=1.0;", "X-OPS-USERID"=>"admin", "X-OPS-TIMESTAMP"=>"2017-05-24T15:29:21Z", "X-OPS-CONTENT-HASH"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-OPS-AUTHORIZATION-1"=>"PRXwqfkP/nFlxgqZGnl0e5105GEkM2WaUce0RRgN0 | |
Ni8iKTqaYkKX00ue/gP", "X-OPS-AUTHORIZATION-2"=>"E5QjOErIBu1Sp/eswjj3opOQoWq6SYesXIb4PpVuPH8iFwe0JsNwHt8/XYAS", "X-OPS-AUTHORIZATION-3"=>"R4S0sn8zKgrB4JpRMlXI7gyNrt6ZFMM+4HMhyJSGpWhHNrLpZ9rqMPxDSvk1", "X-OPS-AUTHORIZATION-4"=>"msSZga5XKNKcJP | |
qTuoTK4KO+fLGHK6Cm1KrKAfx1G13SVntOaJiEymYCl7s6", "X-OPS-AUTHORIZATION-5"=>"4KH9qIyTumVlgFqz3/ueGTy6B/wbjKwtrCIodMhsv57mGqeQEKZJ03hu37tb", "X-OPS-AUTHORIZATION-6"=>"bTWvCMDcZIvjdom6ZpG2FwhEwGedbxS3fxo4v2eMNQ==", "HOST"=>"default-centos65.vag | |
rantup.com:443"}, ssl=#<Faraday::SSLOptions cert_store=#<OpenSSL::X509::Store:0x50c1ee8 @verify_callback=nil, @error=nil, @error_string=nil, @chain=nil, @time=nil, @_httpclient_cert_store_items=["C:/opscode/chefdk/embedded/ssl/certs/cacert. | |
pem"]>>, parallel_manager=nil, params=nil, response=#<Faraday::Response:0x501ece8 @on_complete_callbacks=[], @env=#<Faraday::Env @method=:get @body="{\"error\":[\"Cannot find a cookbook named ohai with version 5.1.0\"]}" @url=#<Addressable: | |
:URI:0x295383c URI:https://default-centos65.vagrantup.com:443/organizations/tprmb/cookbooks/ohai/5.1.0> @request=#<Faraday::RequestOptions (empty)> @request_headers={"Accept"=>"application/json", "Content-Type"=>"application/json", "X-Chef- | |
Version"=>"11.4.0", "User-Agent"=>"Ridley v5.1.0", "X-OPS-SIGN"=>"algorithm=sha1;version=1.0;", "X-OPS-USERID"=>"admin", "X-OPS-TIMESTAMP"=>"2017-05-24T15:29:21Z", "X-OPS-CONTENT-HASH"=>"2jmj7l5rSw0yVb/vlWAYkK/YBwk=", "X-OPS-AUTHORIZATION-1 | |
"=>"PRXwqfkP/nFlxgqZGnl0e5105GEkM2WaUce0RRgN0Ni8iKTqaYkKX00ue/gP", "X-OPS-AUTHORIZATION-2"=>"E5QjOErIBu1Sp/eswjj3opOQoWq6SYesXIb4PpVuPH8iFwe0JsNwHt8/XYAS", "X-OPS-AUTHORIZATION-3"=>"R4S0sn8zKgrB4JpRMlXI7gyNrt6ZFMM+4HMhyJSGpWhHNrLpZ9rqMPxDSv | |
k1", "X-OPS-AUTHORIZATION-4"=>"msSZga5XKNKcJPqTuoTK4KO+fLGHK6Cm1KrKAfx1G13SVntOaJiEymYCl7s6", "X-OPS-AUTHORIZATION-5"=>"4KH9qIyTumVlgFqz3/ueGTy6B/wbjKwtrCIodMhsv57mGqeQEKZJ03hu37tb", "X-OPS-AUTHORIZATION-6"=>"bTWvCMDcZIvjdom6ZpG2FwhEwGedbxS | |
3fxo4v2eMNQ==", "HOST"=>"default-centos65.vagrantup.com:443"} @ssl=#<Faraday::SSLOptions cert_store=#<OpenSSL::X509::Store:0x50c1ee8 @verify_callback=nil, @error=nil, @error_string=nil, @chain=nil, @time=nil, @_httpclient_cert_store_items=[ | |
"C:/opscode/chefdk/embedded/ssl/certs/cacert.pem"]>> @response=#<Faraday::Response:0x501ece8 ...> @response_headers={"Server"=>"openresty/1.11.2.1", "Date"=>"Wed, 24 May 2017 15:29:21 GMT", "Content-Length"=>"66", "Connection"=>"keep-alive" | |
, "X-Ops-Server-API-Version"=>"{\"min_version\":\"0\",\"max_version\":\"1\",\"request_version\":\"0\",\"response_version\":\"0\"}", "X-Ops-API-Info"=>"flavor=cs;version=12.0.0;oc_erchef=12.15.7+20170517144019"} @status=404>>, response_heade | |
rs={"Server"=>"openresty/1.11.2.1", "Date"=>"Wed, 24 May 2017 15:29:21 GMT", "Content-Length"=>"66", "Connection"=>"keep-alive", "X-Ops-Server-API-Version"=>"{\"min_version\":\"0\",\"max_version\":\"1\",\"request_version\":\"0\",\"response_ | |
version\":\"0\"}", "X-Ops-API-Info"=>"flavor=cs;version=12.0.0;oc_erchef=12.15.7+20170517144019"}, status=404> | |
D, [2017-05-24T10:29:21.450242 #13780] DEBUG -- : ** error encounted in Chef response | |
D, [2017-05-24T10:29:21.480742 #13780] DEBUG -- : ==> performing authenticated Chef request as 'admin' | |
D, [2017-05-24T10:29:21.481242 #13780] DEBUG -- : request env: #<struct Faraday::Env method=:post, body="{\"checksums\":{\"019d7c89cfcd76d7db1258f9066e4013\":null,\"066ddcf7d032ed7d4897f3324aab9faa\":null,\"5508d1ff115d0d9a510c9845b54a9ab6\ | |
":null,\"7db24cd08b062581c955da3c00ed2494\":null,\"8070fd3a141f87db4ab39e9b02f05481\":null,\"851a37baf4e39196fc664e393cdf2e11\":null,\"8d495d4a2165a3d8f5246449b3275f37\":null,\"e88b41e9aab63b6307dbb21fbcdaeaf6\":null,\"eac56d5aa5dcee00f6cc6 | |
baf6b32ac30\":null,\"fbf49f2cab4112b08c2bf99543ca98ab\":null}}", url=#<Addressable::URI:0x29dddac URI:https://default-centos65.vagrantup.com:443/organizations/tprmb/sandboxes>, request=#<Faraday::RequestOptions (empty)>, request_headers={"A | |
ccept"=>"application/json", "Content-Type"=>"application/json", "X-Chef-Version"=>"11.4.0", "User-Agent"=>"Ridley v5.1.0", "X-OPS-SIGN"=>"algorithm=sha1;version=1.0;", "X-OPS-USERID"=>"admin", "X-OPS-TIMESTAMP"=>"2017-05-24T15:29:21Z", "X-O | |
PS-CONTENT-HASH"=>"zGrHWQw5nwFdo1CtgaQrBR4IcPY=", "X-OPS-AUTHORIZATION-1"=>"lsdSEvNLsE+KU524RY/tF3l6tJZx2jCeRFfrZdKQjvNnSIeDQ4F1PYevMYv4", "X-OPS-AUTHORIZATION-2"=>"c2UGMUJypQczh14MZil4oZmrpOdy1V6q1qbEE2GDEgX+4JFzmNBvqaefM2Cm", "X-OPS-AUTHO | |
RIZATION-3"=>"a9b6RPhtmiE5aSWHR+e7kQwKKCaMr+2/n03appMbDd4Q1nByY4nLeMQLkw90", "X-OPS-AUTHORIZATION-4"=>"d8gRHExUYKQcVgM5NGYDY23zTqGgfGpG1VTEyFwPxhItCMSZMGJomEzxJT0z", "X-OPS-AUTHORIZATION-5"=>"0tZUUtX64Rdc4nVXLtsrtnwKttxp8rf8/ozoY9f3HFIECa96 | |
qdGcaTlUlNmL", "X-OPS-AUTHORIZATION-6"=>"Zjz7M3OD4gfd5y2UJb22jfJ1I/WLnFPcB7srfOfGAg==", "HOST"=>"default-centos65.vagrantup.com:443", "Content-Length"=>"415"}, ssl=#<Faraday::SSLOptions cert_store=#<OpenSSL::X509::Store:0x50c1ee8 @verify_ca | |
llback=nil, @error=nil, @error_string=nil, @chain=nil, @time=nil, @_httpclient_cert_store_items=["C:/opscode/chefdk/embedded/ssl/certs/cacert.pem"]>>, parallel_manager=nil, params=nil, response=nil, response_headers=nil, status=nil> | |
D, [2017-05-24T10:29:21.557242 #13780] DEBUG -- : ==> handling Chef response | |
D, [2017-05-24T10:29:21.557742 #13780] DEBUG -- : request env: #<struct Faraday::Env method=:post, body="{\"sandbox_id\":\"892e668e73f32daf5399ed7b28a22e8a\",\"uri\":\"https://default-centos65.vagrantup.com/organizations/tprmb/sandboxes/892 | |
e668e73f32daf5399ed7b28a22e8a\",\"checksums\":{\"019d7c89cfcd76d7db1258f9066e4013\":{\"url\":\"https://default-centos65.vagrantup.com:7443/bookshelf/organization-7c8b52baf58758766c4a892e668e73f3/checksum-019d7c89cfcd76d7db1258f9066e4013?AWS | |
AccessKeyId=34c98f459fa03da9856eb17e7dc1641dee0a7093&Expires=1495640661&Signature=M/hK59xoZMXZSTmRTSzk3GgLzqQ%3D\",\"needs_upload\":true},\"066ddcf7d032ed7d4897f3324aab9faa\":{\"url\":\"https://default-centos65.vagrantup.com:7443/bookshelf/ | |
organization-7c8b52baf58758766c4a892e668e73f3/checksum-066ddcf7d032ed7d4897f3324aab9faa?AWSAccessKeyId=34c98f459fa03da9856eb17e7dc1641dee0a7093&Expires=1495640661&Signature=pANKrmqaouaFZwYoo%2BS9wBT3W0A%3D\",\"needs_upload\":true},\"5508d1f | |
f115d0d9a510c9845b54a9ab6\":{\"url\":\"https://default-centos65.vagrantup.com:7443/bookshelf/organization-7c8b52baf58758766c4a892e668e73f3/checksum-5508d1ff115d0d9a510c9845b54a9ab6?AWSAccessKeyId=34c98f459fa03da9856eb17e7dc1641dee0a7093&Exp | |
ires=1495640661&Signature=XJKOuHCkSP7sZgizzggvrPIrUok%3D\",\"needs_upload\":true},\"7db24cd08b062581c955da3c00ed2494\":{\"url\":\"https://default-centos65.vagrantup.com:7443/bookshelf/organization-7c8b52baf58758766c4a892e668e73f3/checksum-7 | |
db24cd08b062581c955da3c00ed2494?AWSAccessKeyId=34c98f459fa03da9856eb17e7dc1641dee0a7093&Expires=1495640661&Signature=N8S/qQFkwNhds6704Kuio/2VwnU%3D\",\"needs_upload\":true},\"8070fd3a141f87db4ab39e9b02f05481\":{\"url\":\"https://default-cen | |
tos65.vagrantup.com:7443/bookshelf/organization-7c8b52baf58758766c4a892e668e73f3/checksum-8070fd3a141f87db4ab39e9b02f05481?AWSAccessKeyId=34c98f459fa03da9856eb17e7dc1641dee0a7093&Expires=1495640661&Signature=UZ6ua1RUSTA20hpLxM3EZIu3V9U%3D\" | |
,\"needs_upload\":true},\"851a37baf4e39196fc664e393cdf2e11\":{\"url\":\"https://default-centos65.vagrantup.com:7443/bookshelf/organization-7c8b52baf58758766c4a892e668e73f3/checksum-851a37baf4e39196fc664e393cdf2e11?AWSAccessKeyId=34c98f459fa | |
03da9856eb17e7dc1641dee0a7093&Expires=1495640661&Signature=Xutkre1gGCZj/3krHw5fXNVkJIU%3D\",\"needs_upload\":true},\"8d495d4a2165a3d8f5246449b3275f37\":{\"url\":\"https://default-centos65.vagrantup.com:7443/bookshelf/organization-7c8b52baf5 | |
8758766c4a892e668e73f3/checksum-8d495d4a2165a3d8f5246449b3275f37?AWSAccessKeyId=34c98f459fa03da9856eb17e7dc1641dee0a7093&Expires=1495640661&Signature=3kOofbxaJ77wX8nxViWo2GBbR9o%3D\",\"needs_upload\":true},\"e88b41e9aab63b6307dbb21fbcdaeaf6 | |
\":{\"url\":\"https://default-centos65.vagrantup.com:7443/bookshelf/organization-7c8b52baf58758766c4a892e668e73f3/checksum-e88b41e9aab63b6307dbb21fbcdaeaf6?AWSAccessKeyId=34c98f459fa03da9856eb17e7dc1641dee0a7093&Expires=1495640661&Signature | |
=WtaTYARHabWs2Y52cJAA9e15xTs%3D\",\"needs_upload\":true},\"eac56d5aa5dcee00f6cc6baf6b32ac30\":{\"url\":\"https://default-centos65.vagrantup.com:7443/bookshelf/organization-7c8b52baf58758766c4a892e668e73f3/checksum-eac56d5aa5dcee00f6cc6baf6b | |
32ac30?AWSAccessKeyId=34c98f459fa03da9856eb17e7dc1641dee0a7093&Expires=1495640661&Signature=ZMAuaXsrlcql6k3QyTqslPtg/Vg%3D\",\"needs_upload\":true},\"fbf49f2cab4112b08c2bf99543ca98ab\":{\"url\":\"https://default-centos65.vagrantup.com:7443/ | |
bookshelf/organization-7c8b52baf58758766c4a892e668e73f3/checksum-fbf49f2cab4112b08c2bf99543ca98ab?AWSAccessKeyId=34c98f459fa03da9856eb17e7dc1641dee0a7093&Expires=1495640661&Signature=lPmv3EzhOZ1tZwbyHUGrJKAImhI%3D\",\"needs_upload\":true}}} | |
", url=#<Addressable::URI:0x29dddac URI:https://default-centos65.vagrantup.com:443/organizations/tprmb/sandboxes>, request=#<Faraday::RequestOptions (empty)>, request_headers={"Accept"=>"application/json", "Content-Type"=>"application/json" | |
, "X-Chef-Version"=>"11.4.0", "User-Agent"=>"Ridley v5.1.0", "X-OPS-SIGN"=>"algorithm=sha1;version=1.0;", "X-OPS-USERID"=>"admin", "X-OPS-TIMESTAMP"=>"2017-05-24T15:29:21Z", "X-OPS-CONTENT-HASH"=>"zGrHWQw5nwFdo1CtgaQrBR4IcPY=", "X-OPS-AUTHO | |
RIZATION-1"=>"lsdSEvNLsE+KU524RY/tF3l6tJZx2jCeRFfrZdKQjvNnSIeDQ4F1PYevMYv4", "X-OPS-AUTHORIZATION-2"=>"c2UGMUJypQczh14MZil4oZmrpOdy1V6q1qbEE2GDEgX+4JFzmNBvqaefM2Cm", "X-OPS-AUTHORIZATION-3"=>"a9b6RPhtmiE5aSWHR+e7kQwKKCaMr+2/n03appMbDd4Q1nBy | |
Y4nLeMQLkw90", "X-OPS-AUTHORIZATION-4"=>"d8gRHExUYKQcVgM5NGYDY23zTqGgfGpG1VTEyFwPxhItCMSZMGJomEzxJT0z", "X-OPS-AUTHORIZATION-5"=>"0tZUUtX64Rdc4nVXLtsrtnwKttxp8rf8/ozoY9f3HFIECa96qdGcaTlUlNmL", "X-OPS-AUTHORIZATION-6"=>"Zjz7M3OD4gfd5y2UJb22j | |
fJ1I/WLnFPcB7srfOfGAg==", "HOST"=>"default-centos65.vagrantup.com:443", "Content-Length"=>"415"}, ssl=#<Faraday::SSLOptions cert_store=#<OpenSSL::X509::Store:0x50c1ee8 @verify_callback=nil, @error=nil, @error_string=nil, @chain=nil, @time=n | |
il, @_httpclient_cert_store_items=["C:/opscode/chefdk/embedded/ssl/certs/cacert.pem"]>>, parallel_manager=nil, params=nil, response=#<Faraday::Response:0x5390e68 @on_complete_callbacks=[], @env=#<Faraday::Env @method=:post @body="{\"sandbox | |
_id\":\"892e668e73f32daf5399ed7b28a22e8a\",\"uri\":\"https://default-centos65.vagrantup.com/organizations/tprmb/sandboxes/892e668e73f32daf5399ed7b28a22e8a\",\"checksums\":{\"019d7c89cfcd76d7db1258f9066e4013\":{\"url\":\"https://default-cent | |
os65.vagrantup.com:7443/bookshelf/organization-7c8b52baf58758766c4a892e668e73f3/checksum-019d7c89cfcd76d7db1258f9066e4013?AWSAccessKeyId=34c98f459fa03da9856eb17e7dc1641dee0a7093&Expires=1495640661&Signature=M/hK59xoZMXZSTmRTSzk3GgLzqQ%3D\", | |
\"needs_upload\":true},\"066ddcf7d032ed7d4897f3324aab9faa\":{\"url\":\"https://default-centos65.vagrantup.com:7443/bookshelf/organization-7c8b52baf58758766c4a892e668e73f3/checksum-066ddcf7d032ed7d4897f3324aab9faa?AWSAccessKeyId=34c98f459fa0 | |
3da9856eb17e7dc1641dee0a7093&Expires=1495640661&Signature=pANKrmqaouaFZwYoo%2BS9wBT3W0A%3D\",\"needs_upload\":true},\"5508d1ff115d0d9a510c9845b54a9ab6\":{\"url\":\"https://default-centos65.vagrantup.com:7443/bookshelf/organization-7c8b52baf | |
58758766c4a892e668e73f3/checksum-5508d1ff115d0d9a510c9845b54a9ab6?AWSAccessKeyId=34c98f459fa03da9856eb17e7dc1641dee0a7093&Expires=1495640661&Signature=XJKOuHCkSP7sZgizzggvrPIrUok%3D\",\"needs_upload\":true},\"7db24cd08b062581c955da3c00ed249 | |
4\":{\"url\":\"https://default-centos65.vagrantup.com:7443/bookshelf/organization-7c8b52baf58758766c4a892e668e73f3/checksum-7db24cd08b062581c955da3c00ed2494?AWSAccessKeyId=34c98f459fa03da9856eb17e7dc1641dee0a7093&Expires=1495640661&Signatur | |
e=N8S/qQFkwNhds6704Kuio/2VwnU%3D\",\"needs_upload\":true},\"8070fd3a141f87db4ab39e9b02f05481\":{\"url\":\"https://default-centos65.vagrantup.com:7443/bookshelf/organization-7c8b52baf58758766c4a892e668e73f3/checksum-8070fd3a141f87db4ab39e9b0 | |
2f05481?AWSAccessKeyId=34c98f459fa03da9856eb17e7dc1641dee0a7093&Expires=1495640661&Signature=UZ6ua1RUSTA20hpLxM3EZIu3V9U%3D\",\"needs_upload\":true},\"851a37baf4e39196fc664e393cdf2e11\":{\"url\":\"https://default-centos65.vagrantup.com:7443 | |
/bookshelf/organization-7c8b52baf58758766c4a892e668e73f3/checksum-851a37baf4e39196fc664e393cdf2e11?AWSAccessKeyId=34c98f459fa03da9856eb17e7dc1641dee0a7093&Expires=1495640661&Signature=Xutkre1gGCZj/3krHw5fXNVkJIU%3D\",\"needs_upload\":true}, | |
\"8d495d4a2165a3d8f5246449b3275f37\":{\"url\":\"https://default-centos65.vagrantup.com:7443/bookshelf/organization-7c8b52baf58758766c4a892e668e73f3/checksum-8d495d4a2165a3d8f5246449b3275f37?AWSAccessKeyId=34c98f459fa03da9856eb17e7dc1641dee0 | |
a7093&Expires=1495640661&Signature=3kOofbxaJ77wX8nxViWo2GBbR9o%3D\",\"needs_upload\":true},\"e88b41e9aab63b6307dbb21fbcdaeaf6\":{\"url\":\"https://default-centos65.vagrantup.com:7443/bookshelf/organization-7c8b52baf58758766c4a892e668e73f3/c | |
hecksum-e88b41e9aab63b6307dbb21fbcdaeaf6?AWSAccessKeyId=34c98f459fa03da9856eb17e7dc1641dee0a7093&Expires=1495640661&Signature=WtaTYARHabWs2Y52cJAA9e15xTs%3D\",\"needs_upload\":true},\"eac56d5aa5dcee00f6cc6baf6b32ac30\":{\"url\":\"https://de | |
fault-centos65.vagrantup.com:7443/bookshelf/organization-7c8b52baf58758766c4a892e668e73f3/checksum-eac56d5aa5dcee00f6cc6baf6b32ac30?AWSAccessKeyId=34c98f459fa03da9856eb17e7dc1641dee0a7093&Expires=1495640661&Signature=ZMAuaXsrlcql6k3QyTqslPt | |
g/Vg%3D\",\"needs_upload\":true},\"fbf49f2cab4112b08c2bf99543ca98ab\":{\"url\":\"https://default-centos65.vagrantup.com:7443/bookshelf/organization-7c8b52baf58758766c4a892e668e73f3/checksum-fbf49f2cab4112b08c2bf99543ca98ab?AWSAccessKeyId=34 | |
c98f459fa03da9856eb17e7dc1641dee0a7093&Expires=1495640661&Signature=lPmv3EzhOZ1tZwbyHUGrJKAImhI%3D\",\"needs_upload\":true}}}" @url=#<Addressable::URI:0x29dddac URI:https://default-centos65.vagrantup.com:443/organizations/tprmb/sandboxes> @ | |
request=#<Faraday::RequestOptions (empty)> @request_headers={"Accept"=>"application/json", "Content-Type"=>"application/json", "X-Chef-Version"=>"11.4.0", "User-Agent"=>"Ridley v5.1.0", "X-OPS-SIGN"=>"algorithm=sha1;version=1.0;", "X-OPS-US | |
ERID"=>"admin", "X-OPS-TIMESTAMP"=>"2017-05-24T15:29:21Z", "X-OPS-CONTENT-HASH"=>"zGrHWQw5nwFdo1CtgaQrBR4IcPY=", "X-OPS-AUTHORIZATION-1"=>"lsdSEvNLsE+KU524RY/tF3l6tJZx2jCeRFfrZdKQjvNnSIeDQ4F1PYevMYv4", "X-OPS-AUTHORIZATION-2"=>"c2UGMUJypQcz | |
h14MZil4oZmrpOdy1V6q1qbEE2GDEgX+4JFzmNBvqaefM2Cm", "X-OPS-AUTHORIZATION-3"=>"a9b6RPhtmiE5aSWHR+e7kQwKKCaMr+2/n03appMbDd4Q1nByY4nLeMQLkw90", "X-OPS-AUTHORIZATION-4"=>"d8gRHExUYKQcVgM5NGYDY23zTqGgfGpG1VTEyFwPxhItCMSZMGJomEzxJT0z", "X-OPS-AUTH | |
ORIZATION-5"=>"0tZUUtX64Rdc4nVXLtsrtnwKttxp8rf8/ozoY9f3HFIECa96qdGcaTlUlNmL", "X-OPS-AUTHORIZATION-6"=>"Zjz7M3OD4gfd5y2UJb22jfJ1I/WLnFPcB7srfOfGAg==", "HOST"=>"default-centos65.vagrantup.com:443", "Content-Length"=>"415"} @ssl=#<Faraday::SS | |
LOptions cert_store=#<OpenSSL::X509::Store:0x50c1ee8 @verify_callback=nil, @error=nil, @error_string=nil, @chain=nil, @time=nil, @_httpclient_cert_store_items=["C:/opscode/chefdk/embedded/ssl/certs/cacert.pem"]>> @response=#<Faraday::Respon | |
se:0x5390e68 ...> @response_headers={"Server"=>"openresty/1.11.2.1", "Date"=>"Wed, 24 May 2017 15:29:21 GMT", "Content-Type"=>"application/json", "Content-Length"=>"3405", "Connection"=>"keep-alive", "X-Ops-Server-API-Version"=>"{\"min_vers | |
ion\":\"0\",\"max_version\":\"1\",\"request_version\":\"0\",\"response_version\":\"0\"}", "X-Ops-API-Info"=>"flavor=cs;version=12.0.0;oc_erchef=12.15.7+20170517144019", "Location"=>"http://default-centos65.vagrantup.com/organizations/tprmb/ | |
sandboxes/892e668e73f32126a58e5b8613243d23"} @status=201>>, response_headers={"Server"=>"openresty/1.11.2.1", "Date"=>"Wed, 24 May 2017 15:29:21 GMT", "Content-Type"=>"application/json", "Content-Length"=>"3405", "Connection"=>"keep-alive", | |
"X-Ops-Server-API-Version"=>"{\"min_version\":\"0\",\"max_version\":\"1\",\"request_version\":\"0\",\"response_version\":\"0\"}", "X-Ops-API-Info"=>"flavor=cs;version=12.0.0;oc_erchef=12.15.7+20170517144019", "Location"=>"http://default-ce | |
ntos65.vagrantup.com/organizations/tprmb/sandboxes/892e668e73f32126a58e5b8613243d23"}, status=201> | |
D, [2017-05-24T10:29:21.563242 #13780] DEBUG -- : ==> parsing Chef response body as JSON | |
D, [2017-05-24T10:29:21.575242 #13780] DEBUG -- : ==> performing authenticated Chef request as 'admin' | |
D, [2017-05-24T10:29:21.575242 #13780] DEBUG -- : request env: #<struct Faraday::Env method=:put, body="#\n# Cookbook:: ohai\n# Recipe:: default\n#\n# Copyright:: 2011-2017, Chef Software, Inc\n#\n# Licensed under the Apache License, Versio | |
n 2.0 (the \"License\");\n# you may not use this file except in compliance with the License.\n# You may obtain a copy of the License at\n#\n# http://www.apache.org/licenses/LICENSE-2.0\n#\n# Unless required by applicable law or agreed t | |
o in writing, software\n# distributed under the License is distributed on an \"AS IS\" BASIS,\n# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n# See the License for the specific language governing permissions and | |
\n# limitations under the License.\n#\n\nChef::Log.warn('The Ohai cookbook default recipe has no content as of the 4.0 release. See the readme for instructions on using the custom resources.')\n", url=#<URI::HTTPS https://default-centos65.v | |
agrantup.com:7443/bookshelf/organization-7c8b52baf58758766c4a892e668e73f3/checksum-019d7c89cfcd76d7db1258f9066e4013?AWSAccessKeyId=34c98f459fa03da9856eb17e7dc1641dee0a7093&Expires=1495640661&Signature=M%2FhK59xoZMXZSTmRTSzk3GgLzqQ%3D>, requ | |
est=#<Faraday::RequestOptions (empty)>, request_headers={"Accept"=>"application/json", "Content-Type"=>"application/x-binary", "X-Chef-Version"=>"11.4.0", "User-Agent"=>"Faraday v0.9.2", "content-md5"=>"AZ18ic/NdtfbElj5Bm5AEw==", "X-OPS-SIG | |
N"=>"algorithm=sha1;version=1.0;", "X-OPS-USERID"=>"admin", "X-OPS-TIMESTAMP"=>"2017-05-24T15:29:21Z", "X-OPS-CONTENT-HASH"=>"cNLkU8dgonuXqZFP8YH7Yws3564=", "X-OPS-AUTHORIZATION-1"=>"MsiTUKlvHSWnmAcoqxCwufIxGTDi3kNBroHmEMWI+jh/qg8lQc7aXUh8u | |
Oc5", "X-OPS-AUTHORIZATION-2"=>"Hdw5X7K5v8J89L2Z/+ETRh4PcN5k7HaOGJhs8qxZqBFY2Dh9pbucLthrouct", "X-OPS-AUTHORIZATION-3"=>"cJjAgb+vR5dbg+i0jQ8ikrtTCWDb2HwCwxIgN5AAznS6y8B4+C2yIfo27MRb", "X-OPS-AUTHORIZATION-4"=>"29zm8Ml9FhNzTYW86hcJHzc2lyZ52t | |
mboH7Y8ZTESbHP5zKM5rJw/8eU2p4b", "X-OPS-AUTHORIZATION-5"=>"w4BXmzuvniz9E0ZysIx5euZNFOhTewDVHzK/aPp4Va+FlbKNXvMU6CMLDPVZ", "X-OPS-AUTHORIZATION-6"=>"BD2D/UX6t6BS1477OsTD/iNlbpJfHzSbGQ9xWtUkoA==", "HOST"=>"default-centos65.vagrantup.com:7443" | |
, "Content-Length"=>"786"}, ssl=#<Faraday::SSLOptions cert_store=#<OpenSSL::X509::Store:0x50c1ee8 @verify_callback=nil, @error=nil, @error_string=nil, @chain=nil, @time=nil, @_httpclient_cert_store_items=["C:/opscode/chefdk/embedded/ssl/cer | |
ts/cacert.pem"]>>, parallel_manager=nil, params=nil, response=nil, response_headers=nil, status=nil> | |
D, [2017-05-24T10:29:21.590742 #13780] DEBUG -- : ==> performing authenticated Chef request as 'admin' | |
D, [2017-05-24T10:29:21.591242 #13780] DEBUG -- : request env: #<struct Faraday::Env method=:put, body="property :hint_name, String, name_property: true\nproperty :content, Hash\nproperty :compile_time, [true, false], default: true\n\nactio | |
n :create do\n directory ::Ohai::Config.ohai.hints_path.first do\n action :create\n recursive true\n end\n\n file ohai_hint_path do\n action :create\n content build_content\n end\nend\n\naction :delete do\n file ohai_hint_p | |
ath do\n action :delete\n notifies :reload, ohai[reload ohai post hint removal]\n end\n\n ohai 'reload ohai post hint removal' do\n action :nothing\n end\nend\n\naction_class do\n def ohai_hint_path\n path = ::File.join(::Oh | |
ai::Config.ohai.hints_path.first, new_resource.hint_name)\n path << '.json' unless path.end_with?('.json')\n path\n end\n\n def build_content\n # passing nil to file produces deprecation warnings so pass an empty string\n retu | |
rn nil if new_resource.content.nil? || new_resource.content.empty?\n JSON.pretty_generate(new_resource.content)\n end\n\n def file_content(path)\n return JSON.parse(::File.read(path))\n rescue JSON::ParserError\n Chef::Log.debug | |
(\"Could not parse JSON in ohai hint at \#{ohai_hint_path}. It's probably an empty hint file\")\n return nil\n end\nend\n\n# this resource forces itself to run at compile_time\ndef after_created\n return unless compile_time\n Array(ac | |
tion).each do |action|\n run_action(action)\n end\nend\n", url=#<URI::HTTPS https://default-centos65.vagrantup.com:7443/bookshelf/organization-7c8b52baf58758766c4a892e668e73f3/checksum-eac56d5aa5dcee00f6cc6baf6b32ac30?AWSAccessKeyId=34c | |
98f459fa03da9856eb17e7dc1641dee0a7093&Expires=1495640661&Signature=ZMAuaXsrlcql6k3QyTqslPtg%2FVg%3D>, request=#<Faraday::RequestOptions (empty)>, request_headers={"Accept"=>"application/json", "Content-Type"=>"application/x-binary", "X-Chef | |
-Version"=>"11.4.0", "User-Agent"=>"Faraday v0.9.2", "content-md5"=>"6sVtWqXc7gD2zGuvazKsMA==", "X-OPS-SIGN"=>"algorithm=sha1;version=1.0;", "X-OPS-USERID"=>"admin", "X-OPS-TIMESTAMP"=>"2017-05-24T15:29:21Z", "X-OPS-CONTENT-HASH"=>"k4XsymJX | |
+M8TIypj2Atx9ohgdbw=", "X-OPS-AUTHORIZATION-1"=>"Gf6oy7OI8+0NuExvN7S0x9PyAeaUDs4sWFPg4Co1GrEPnPWQ5w3eYCDFOFlH", "X-OPS-AUTHORIZATION-2"=>"aTZBRVOD/XgGDp6dPMTBU2VRvRe/DHxCUdRDudPv8l8Yl5Vr5bDyjXEfBIfE", "X-OPS-AUTHORIZATION-3"=>"FW6XFodr8Y3g7 | |
kcwmkk6/rtYmyT/ChnWbC/rK5kXQ+aDrVEmYNy+iOu2Lhqr", "X-OPS-AUTHORIZATION-4"=>"tFNGXQYvkg1TGjOSJYGQZ+sf9DDLzJcgmP85yUHjPWuwKAnOubItuzbqX/Rx", "X-OPS-AUTHORIZATION-5"=>"wlgs41ur2LKgp00Qzy4K0KV7yjirezYm1pWt0UYssp79qikSjrcZJ6MejklT", "X-OPS-AUTHO | |
RIZATION-6"=>"z3KKTH4qypHHzMFasr8xx61wcZ9X047OizUntazzKA==", "HOST"=>"default-centos65.vagrantup.com:7443", "Content-Length"=>"1338"}, ssl=#<Faraday::SSLOptions cert_store=#<OpenSSL::X509::Store:0x50c1ee8 @verify_callback=nil, @error=nil, @ | |
error_string=nil, @chain=nil, @time=nil, @_httpclient_cert_store_items=["C:/opscode/chefdk/embedded/ssl/certs/cacert.pem"]>>, parallel_manager=nil, params=nil, response=nil, response_headers=nil, status=nil> | |
D, [2017-05-24T10:29:21.594242 #13780] DEBUG -- : ==> performing authenticated Chef request as 'admin' | |
D, [2017-05-24T10:29:21.594742 #13780] DEBUG -- : request env: #<struct Faraday::Env method=:put, body="#\n# Cookbook:: ohai\n# Library:: matchers\n#\n# Author:: Tim Smith (<[email protected]>)\n#\n# Copyright:: 2016-2017, Chef Software, Inc.\ | |
n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");\n# you may not use this file except in compliance with the License.\n# You may obtain a copy of the License at\n#\n# http://www.apache.org/licenses/LICENSE-2.0\n#\n | |
# Unless required by applicable law or agreed to in writing, software\n# distributed under the License is distributed on an \"AS IS\" BASIS,\n# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n# See the License for | |
the specific language governing permissions and\n# limitations under the License.\n#\n\nif defined?(ChefSpec)\n ChefSpec.define_matcher :ohai_hint\n ChefSpec.define_matcher :ohai_plugin\n\n def create_ohai_hint(resource)\n ChefSpec::M | |
atchers::ResourceMatcher.new(:ohai_hint, :create, resource)\n end\n\n def delete_ohai_hint(resource)\n ChefSpec::Matchers::ResourceMatcher.new(:ohai_hint, :delete, resource)\n end\n\n def create_ohai_plugin(resource)\n ChefSpec::M | |
atchers::ResourceMatcher.new(:ohai_plugin, :create, resource)\n end\n\n def delete_ohai_plugin(resource)\n ChefSpec::Matchers::ResourceMatcher.new(:ohai_plugin, :delete, resource)\n end\nend\n", url=#<URI::HTTPS https://default-centos | |
65.vagrantup.com:7443/bookshelf/organization-7c8b52baf58758766c4a892e668e73f3/checksum-7db24cd08b062581c955da3c00ed2494?AWSAccessKeyId=34c98f459fa03da9856eb17e7dc1641dee0a7093&Expires=1495640661&Signature=N8S%2FqQFkwNhds6704Kuio%2F2VwnU%3D> | |
, request=#<Faraday::RequestOptions (empty)>, request_headers={"Accept"=>"application/json", "Content-Type"=>"application/x-binary", "X-Chef-Version"=>"11.4.0", "User-Agent"=>"Faraday v0.9.2", "content-md5"=>"fbJM0IsGJYHJVdo8AO0klA==", "X-O | |
PS-SIGN"=>"algorithm=sha1;version=1.0;", "X-OPS-USERID"=>"admin", "X-OPS-TIMESTAMP"=>"2017-05-24T15:29:21Z", "X-OPS-CONTENT-HASH"=>"WRi0p8ba0tKdX31biutzJkRLxks=", "X-OPS-AUTHORIZATION-1"=>"KeUL8kz7gm+QctJPiwsC+iYs4GqAOe352neRQlw9Pw/FzOx9unV | |
1EIVw1Ej3", "X-OPS-AUTHORIZATION-2"=>"IrKNz9JMUom3fKhXN7nCXWLU+vMeLNwuUOKeb1/RtXxFZIxlha1O2f6EMLtT", "X-OPS-AUTHORIZATION-3"=>"yr0ori6y9eEy5iuxU+v3Sfhaf7htj6hbxFoaoSl7rryeojp3lqxzIeBJ7GlA", "X-OPS-AUTHORIZATION-4"=>"pM7BiodSZymi5sNL7sCO/48j | |
z5E6Vm7wrQh3PbJeS4jOVAfW9Rr7UE8U4U5e", "X-OPS-AUTHORIZATION-5"=>"omMVrAWyk4GsRIUXNkIfJftxIuDBGHYPCZc8YWiZM8+xnCNaGrTIfJRoSm19", "X-OPS-AUTHORIZATION-6"=>"jNspunmAKDjb5joobVMIKdL2eCcgzD/lTO9KPQuTYw==", "HOST"=>"default-centos65.vagrantup.com | |
:7443", "Content-Length"=>"1249"}, ssl=#<Faraday::SSLOptions cert_store=#<OpenSSL::X509::Store:0x50c1ee8 @verify_callback=nil, @error=nil, @error_string=nil, @chain=nil, @time=nil, @_httpclient_cert_store_items=["C:/opscode/chefdk/embedded/ | |
ssl/certs/cacert.pem"]>>, parallel_manager=nil, params=nil, response=nil, response_headers=nil, status=nil> | |
D, [2017-05-24T10:29:21.603742 #13780] DEBUG -- : ==> performing authenticated Chef request as 'admin' | |
D, [2017-05-24T10:29:21.604742 #13780] DEBUG -- : request env: #<struct Faraday::Env method=:put, body="property :plugin_name, String, name_property: true\nproperty :path, String\nproperty :source_file, String\nproperty :cookbook, String\np | |
roperty :resource, [:cookbook_file, :template], default: :cookbook_file\nproperty :variables, Hash\nproperty :compile_time, [true, false], default: true\n\naction :create do\n # why create_if_missing you ask?\n # no one can agree on perms | |
and this allows them to manage the perms elsewhere\n directory desired_plugin_path do\n action :create\n recursive true\n not_if { ::File.exist?(desired_plugin_path) }\n end\n\n if new_resource.resource.eql?(:cookbook_file)\n | |
cookbook_file ::File.join(desired_plugin_path, new_resource.plugin_name + '.rb') do\n cookbook new_resource.cookbook\n source new_resource.source_file || \"\#{new_resource.plugin_name}.rb\"\n notifies :reload, \"ohai[\#{new | |
_resource.plugin_name}]\", :immediately\n end\n elsif new_resource.resource.eql?(:template)\n template ::File.join(desired_plugin_path, new_resource.plugin_name + '.rb') do\n cookbook new_resource.cookbook\n source new_reso | |
urce.source_file || \"\#{new_resource.plugin_name}.rb\"\n variables new_resource.variables\n notifies :reload, \"ohai[\#{new_resource.plugin_name}]\", :immediately\n end\n end\n\n # Add the plugin path to the ohai plugin path | |
if need be and warn\n # the user that this is going to result in a reload every run\n unless in_plugin_path?(desired_plugin_path)\n plugin_path_warning\n Chef::Log.warn(\"Adding \#{desired_plugin_path} to the Ohai plugin path for t | |
his chef-client run only\")\n add_to_plugin_path(desired_plugin_path)\n reload_required = true\n end\n\n ohai new_resource.plugin_name do\n action :nothing\n action :reload if reload_required\n end\nend\n\naction :delete do\n | |
file ::File.join(desired_plugin_path, new_resource.plugin_name + '.rb') do\n action :delete\n notifies :reload, 'ohai[reload ohai post plugin removal]'\n end\n\n ohai 'reload ohai post plugin removal' do\n action :nothing\n en | |
d\nend\n\naction_class do\n # return the path property if specified or\n # CHEF_CONFIG_PATH/ohai/plugins if a path isn't specified\n def desired_plugin_path\n if new_resource.path\n new_resource.path\n else\n ::File.join( | |
chef_config_path, 'ohai', 'plugins')\n end\n end\n\n # return the chef config files dir or fail hard\n def chef_config_path\n if Chef::Config['config_file']\n ::File.dirname(Chef::Config['config_file'])\n else\n Chef:: | |
Application.fatal!(\"No chef config file defined. Are you running \\\nchef-solo? If so you will need to define a path for the ohai_plugin as the \\\npath cannot be determined\")\n end\n end\n\n # is the desired plugin dir in the ohai c | |
onfig plugin dir array?\n def in_plugin_path?(path)\n # get the directory where we plan to stick the plugin (not the actual file path)\n desired_dir = ::File.directory?(path) ? path : ::File.dirname(path)\n\n case node['platform'] | |
\n when 'windows'\n ::Ohai::Config.ohai['plugin_path'].map(&:downcase).include?(desired_dir.downcase)\n else\n ::Ohai::Config.ohai['plugin_path'].include?(desired_dir)\n end\n end\n\n def add_to_plugin_path(path)\n : | |
:Ohai::Config.ohai['plugin_path'] << path # new format\n end\n\n # we need to warn the user that unless the path for this plugin is in Ohai's\n # plugin path already we're going to have to reload Ohai on every Chef run.\n # Ideally in f | |
uture versions of Ohai /etc/chef/ohai/plugins is in the path.\n def plugin_path_warning\n Chef::Log.warn(\"The Ohai plugin_path does not include \#{desired_plugin_path}. \\\nOhai will reload on each chef-client run in order to add this | |
directory to the \\\npath unless you modify your client.rb configuration to add this directory to \\\nplugin_path. The plugin_path can be set via the chef-client::config recipe. \\\nSee 'Ohai Settings' at https://docs.chef.io/config_rb_clie | |
nt.html#ohai-settings \\\nfor more details.\")\n end\nend\n\n# this resource forces itself to run at compile_time\ndef after_created\n return unless compile_time\n Array(action).each do |action|\n run_action(action)\n end\nend\n", ur | |
l=#<URI::HTTPS https://default-centos65.vagrantup.com:7443/bookshelf/organization-7c8b52baf58758766c4a892e668e73f3/checksum-fbf49f2cab4112b08c2bf99543ca98ab?AWSAccessKeyId=34c98f459fa03da9856eb17e7dc1641dee0a7093&Expires=1495640661&Signatur | |
e=lPmv3EzhOZ1tZwbyHUGrJKAImhI%3D>, request=#<Faraday::RequestOptions (empty)>, request_headers={"Accept"=>"application/json", "Content-Type"=>"application/x-binary", "X-Chef-Version"=>"11.4.0", "User-Agent"=>"Faraday v0.9.2", "content-md5"= | |
>"+/SfLKtBErCMK/mVQ8qYqw==", "X-OPS-SIGN"=>"algorithm=sha1;version=1.0;", "X-OPS-USERID"=>"admin", "X-OPS-TIMESTAMP"=>"2017-05-24T15:29:21Z", "X-OPS-CONTENT-HASH"=>"cnVZgdTW12yUVkR2aVu8uwKnl9g=", "X-OPS-AUTHORIZATION-1"=>"UtkcMyu2ODenw4gOTF | |
UxF+5h+HGxKQfjgh6l/gcTY4KU50buUNGaYuLqO51d", "X-OPS-AUTHORIZATION-2"=>"N8G4KUlmYThEZLl4ClIbko4/6lobcjgdSv80gk+S72QwHtwfM67okWqvIZ1k", "X-OPS-AUTHORIZATION-3"=>"FWOmdVcG5HX9WOgfrq3B9sPFzPoR727Mm30R0R9d6FNIHHAiJ1vge3RkMjgV", "X-OPS-AUTHORIZAT | |
ION-4"=>"Y9vmz7POgzhsfyXKa+9E1J2T5lo3TcAZpIOpR07bsa9xvPJ7tgc2z20Q7qhl", "X-OPS-AUTHORIZATION-5"=>"A/zP/voAb3HOMK+BeKoY6dZY4SH1z5WPTdar/IIvlPaOiec1q5bvnCvydGbq", "X-OPS-AUTHORIZATION-6"=>"Ef9Ymqihfyv2pOD9wZgBVngjNQ7A2KwouDBRcToJ6g==", "HOST" | |
=>"default-centos65.vagrantup.com:7443", "Content-Length"=>"4067"}, ssl=#<Faraday::SSLOptions cert_store=#<OpenSSL::X509::Store:0x50c1ee8 @verify_callback=nil, @error=nil, @error_string=nil, @chain=nil, @time=nil, @_httpclient_cert_store_it | |
ems=["C:/opscode/chefdk/embedded/ssl/certs/cacert.pem"]>>, parallel_manager=nil, params=nil, response=nil, response_headers=nil, status=nil> | |
C:/opscode/chefdk/embedded/lib/ruby/gems/2.3.0/gems/celluloid-0.16.0/lib/celluloid/actor.rb:345:in `each': task was terminated (Celluloid::Task::TerminatedError) | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.3.0/gems/celluloid-0.16.0/lib/celluloid/actor.rb:345:in `cleanup' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.3.0/gems/celluloid-0.16.0/lib/celluloid/actor.rb:329:in `shutdown' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.3.0/gems/celluloid-0.16.0/lib/celluloid/actor.rb:321:in `handle_crash' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.3.0/gems/celluloid-0.16.0/lib/celluloid/actor.rb:166:in `rescue in run' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.3.0/gems/celluloid-0.16.0/lib/celluloid/actor.rb:148:in `run' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.3.0/gems/celluloid-0.16.0/lib/celluloid/actor.rb:130:in `block in start' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.3.0/gems/celluloid-0.16.0/lib/celluloid/thread_handle.rb:13:in `block in initialize' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.3.0/gems/celluloid-0.16.0/lib/celluloid/actor_system.rb:32:in `block in get_thread' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.3.0/gems/celluloid-0.16.0/lib/celluloid/internal_pool.rb:130:in `block in create' | |
from (celluloid):0:in `remote procedure call' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.3.0/gems/celluloid-0.16.0/lib/celluloid/calls.rb:92:in `value' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.3.0/gems/celluloid-0.16.0/lib/celluloid/proxies/sync_proxy.rb:33:in `method_missing' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.3.0/gems/berkshelf-5.6.4/lib/berkshelf/uploader.rb:55:in `block (2 levels) in upload' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.3.0/gems/berkshelf-5.6.4/lib/berkshelf/uploader.rb:51:in `each' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.3.0/gems/berkshelf-5.6.4/lib/berkshelf/uploader.rb:51:in `block in upload' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.3.0/gems/ridley-5.1.0/lib/ridley/client.rb:38:in `open' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.3.0/gems/ridley-5.1.0/lib/ridley.rb:56:in `open' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.3.0/gems/berkshelf-5.6.4/lib/berkshelf.rb:166:in `ridley_connection' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.3.0/gems/berkshelf-5.6.4/lib/berkshelf/uploader.rb:50:in `upload' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.3.0/gems/berkshelf-5.6.4/lib/berkshelf/uploader.rb:37:in `run' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.3.0/gems/berkshelf-5.6.4/lib/berkshelf/berksfile.rb:593:in `upload' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.3.0/gems/berkshelf-5.6.4/lib/berkshelf/cli.rb:208:in `upload' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.3.0/gems/thor-0.19.1/lib/thor/command.rb:27:in `run' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.3.0/gems/thor-0.19.1/lib/thor/invocation.rb:126:in `invoke_command' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.3.0/gems/thor-0.19.1/lib/thor.rb:359:in `dispatch' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.3.0/gems/berkshelf-5.6.4/lib/berkshelf/cli.rb:52:in `dispatch' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.3.0/gems/thor-0.19.1/lib/thor/base.rb:440:in `start' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.3.0/gems/berkshelf-5.6.4/lib/berkshelf/cli.rb:27:in `execute!' | |
from C:/opscode/chefdk/embedded/lib/ruby/gems/2.3.0/gems/berkshelf-5.6.4/bin/berks:5:in `<top (required)>' | |
from C:/opscode/chefdk/bin/berks:52:in `load' | |
from C:/opscode/chefdk/bin/berks:52:in `<main>' |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment