Hi Jakov, On 21 November 2012 02:03, Jakov Sosic wrote: > > exec{'first': > command => 'cd /tmp && wget mykey', > creates => '/tmp/mykey', > } > > exec{'second': > command => 'echo "" > /tmp/mykey | tee -a /tmp/mykey2', > creates => '/tmp/mykey2', > } >
...a really beautiful ugly hack. I appreciate the input because it sounds like I'm not missing anything really obvious. When coding in a new (declarative) language, I'm always mindful that I could be thinking about the problem incorrectly. I'm surprised in this case that more puppeteers haven't had the same problem. Perhaps I should be writing some kind of secure ssh-agent based key management plugin for Puppet? Also John, thanks for the suggestion. Sending a plaintext password to the git clone call is an option, but I've got several git and several SVN repos, all connecting over SSH so the agent-play made more sense to me. Cheers, Alex -- You received this message because you are subscribed to the Google Groups "Puppet Users" group. To view this discussion on the web visit https://groups.google.com/d/msg/puppet-users/-/_wHDatM6yEwJ. To post to this group, send email to puppet-users@googlegroups.com. To unsubscribe from this group, send email to puppet-users+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/puppet-users?hl=en.