Adoptable Cookbooks List

Looking for a cookbook to adopt? You can now see a list of cookbooks available for adoption!
List of Adoptable Cookbooks

Supermarket Belongs to the Community

Supermarket belongs to the community. While Chef has the responsibility to keep it running and be stewards of its functionality, what it does and how it works is driven by the community. The chef/supermarket repository will continue to be where development of the Supermarket application takes place. Come be part of shaping the direction of Supermarket by opening issues and pull requests or by joining us on the Chef Mailing List.

Select Badges

Select Supported Platforms


rbac (5) Versions 1.0.2

Allows delegation of service management to users with Solaris Role Based Access Control (RBAC)

cookbook 'rbac', '= 1.0.2'
cookbook 'rbac', '= 1.0.2', :supermarket
knife supermarket install rbac
knife supermarket download rbac
Quality -%

Role based access control

Solaris and Illumos provide sophisticated role-based access control for delegating authorizations within the system. Using RBAC, users can be given permissions to manage and update services without sudo.

This cookbook provides chef with LWRPs to manage RBAC and grant permissions.

At this time this cookbook ONLY manages SMF-related permissions (ie, ability of non-priviliged users to start/stop SMF services), but in the future it may be enhanced to support arbitrary Solaris permissions.


In order to add the RBAC LWRPs to a chef run, add the following recipe to the run_list:


This will do no work, but will load the providers.



Defines a set of authorizations that can be applied to SMF services and authorized to users, without actually applying them to users.

Actions: * create (default)

Attributes: * name


rbac "nginx" do
  action :create

This will update the authorizations file at /etc/security/auth_attr with the following lines:

solaris.smf.manage.nginx:::Manage nginx Service States::
solaris.smf.value.nginx:::Change value of nginx Service::

Users who are given these authorizations can change properties of the service as well as change its state (i.e. svcadm disable|enable|restart|clear service


Adds the rbac definition created by auth to the user name.

Actions: * add (default)

Attributes: * name - for descriptive purposes and to ensure that each LWRP call is uniquely identified in the chef run * user * auth


rbac_auth "add nginx management permissions to my_user" do
  user "my_user"
  auth "nginx"

This adds both manage and value auths to user my_user.


  • separate manage auth from value auth
  • ability to delete all rbac attributes

No quality metric results found