Issue #4884 has been updated by Daniel Pittman.

Assignee deleted (Daniel Pittman)

----------------------------------------
Feature #4884: An exec provider that executes unfiltered bash code.
https://projects.puppetlabs.com/issues/4884#change-92394

* Author: Jesse Wolfe
* Status: Closed
* Priority: Urgent
* Assignee: 
* Category: exec
* Target version: 
* Affected Puppet version: 
* Keywords: 
* Branch: 
https://github.com/daniel-pittman/puppet/tree/feature/2.6.next/4884-an-exec-provider-that-executes-unfiltered-bash-code
----------------------------------------
Some users have been using a workaround to allow Exec resources to run inline 
bash scripts (rather than calling an executable), as seen in the comments on 
#4288

We should consider adding this as a feature; I am opening this ticket for 
discussion.


-- 
You have received this notification because you have either subscribed to it, 
or are involved in it.
To change your notification preferences, please click here: 
http://projects.puppetlabs.com/my/account

-- 
You received this message because you are subscribed to the Google Groups 
"Puppet Bugs" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at http://groups.google.com/group/puppet-bugs?hl=en.
For more options, visit https://groups.google.com/groups/opt_out.


Reply via email to