Issue #4884 has been updated by eric sorenson. Status changed from Closed to Re-opened Target version deleted (2.6.8)
Sorry to update on a closed ticket but this is a pretty big behavioural change that isn't documented in the release notes, except the following under 2.6.8: <pre> Notable Features and Bug Fixes Bug #4884: Shell exec provider that executes code as a raw shell script </pre> Nor under the current type reference except to note that 'provider =>' shell is available. Could this be punched up a bit? Maybe to include Markus' discussion of the security issues at http://projects.puppetlabs.com/issues/4288#note-16 Minimally, some kind of caveat in the 2.6.0 "New features" section of release notes, ideally there _plus_ a description on the exec type about how the command attribute's parameters get passed to the shell. Thanks. ---------------------------------------- Feature #4884: An exec provider that executes unfiltered bash code. https://projects.puppetlabs.com/issues/4884 Author: Jesse Wolfe Status: Re-opened Priority: Urgent Assignee: Daniel Pittman Category: exec Target version: Affected Puppet version: Keywords: Branch: https://github.com/daniel-pittman/puppet/tree/feature/2.6.next/4884-an-exec-provider-that-executes-unfiltered-bash-code Some users have been using a workaround to allow Exec resources to run inline bash scripts (rather than calling an executable), as seen in the comments on #4288 We should consider adding this as a feature; I am opening this ticket for discussion. -- You have received this notification because you have either subscribed to it, or are involved in it. To change your notification preferences, please click here: http://projects.puppetlabs.com/my/account -- You received this message because you are subscribed to the Google Groups "Puppet Bugs" group. To post to this group, send email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/puppet-bugs?hl=en.
