Issue #4884 has been updated by Daniel Pittman. Assignee deleted (Daniel Pittman)
---------------------------------------- Feature #4884: An exec provider that executes unfiltered bash code. https://projects.puppetlabs.com/issues/4884#change-92394 * Author: Jesse Wolfe * Status: Closed * Priority: Urgent * Assignee: * Category: exec * Target version: * Affected Puppet version: * Keywords: * Branch: https://github.com/daniel-pittman/puppet/tree/feature/2.6.next/4884-an-exec-provider-that-executes-unfiltered-bash-code ---------------------------------------- Some users have been using a workaround to allow Exec resources to run inline bash scripts (rather than calling an executable), as seen in the comments on #4288 We should consider adding this as a feature; I am opening this ticket for discussion. -- You have received this notification because you have either subscribed to it, or are involved in it. To change your notification preferences, please click here: http://projects.puppetlabs.com/my/account -- You received this message because you are subscribed to the Google Groups "Puppet Bugs" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send email to [email protected]. Visit this group at http://groups.google.com/group/puppet-bugs?hl=en. For more options, visit https://groups.google.com/groups/opt_out.
