Issue #4884 has been updated by Daniel Pittman. Branch set to https://github.com/daniel-pittman/puppet/tree/feature/2.6.next/4884-an-exec-provider-that-executes-unfiltered-bash-code
Nigel Kersten wrote: > Are you working on this issue actively Daniel? Yes, and I failed to communicate that to the community at large. I might just fix that failure of my process. I have a branch in progress at https://github.com/daniel-pittman/puppet/tree/feature/2.6.next/4884-an-exec-provider-that-executes-unfiltered-bash-code that is working toward an implementation. Be warned, if you plan to depend on this code, that I am force-pushing that branch occasionally if I rewrite history, and I will eventually squash the long series of work-in-progress commits into a coherent patch series for public consumption. The code is not currently usable, but instead is focused on adding tests to the `exec` type, and eventually providers, to ensure they don't regress during this set of code changes. ---------------------------------------- Feature #4884: An exec provider that executes unfiltered bash code. https://projects.puppetlabs.com/issues/4884 Author: Jesse Wolfe Status: Investigating Priority: Urgent Assignee: Daniel Pittman Category: exec Target version: 2.6.6 Affected Puppet version: Keywords: Branch: https://github.com/daniel-pittman/puppet/tree/feature/2.6.next/4884-an-exec-provider-that-executes-unfiltered-bash-code Some users have been using a workaround to allow Exec resources to run inline bash scripts (rather than calling an executable), as seen in the comments on #4288 We should consider adding this as a feature; I am opening this ticket for discussion. -- You have received this notification because you have either subscribed to it, or are involved in it. To change your notification preferences, please click here: http://projects.puppetlabs.com/my/account -- You received this message because you are subscribed to the Google Groups "Puppet Bugs" group. To post to this group, send email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/puppet-bugs?hl=en.
