Hi Jakov,

On 21 November 2012 02:03, Jakov Sosic wrote:
>
> exec{'first':
>   command => 'cd /tmp && wget mykey',
>   creates => '/tmp/mykey',
> }
>
> exec{'second':
>   command => 'echo "" > /tmp/mykey | tee -a /tmp/mykey2',
>   creates => '/tmp/mykey2',
> }
>

...a really beautiful ugly hack.  I appreciate the input because it sounds 
like I'm not missing anything really obvious.  When coding in a new 
(declarative) language, I'm always mindful that I could be thinking about 
the problem incorrectly.  I'm surprised in this case that more puppeteers 
haven't had the same problem.  Perhaps I should be writing some kind of 
secure ssh-agent based key management plugin for Puppet?

Also John, thanks for the suggestion.  Sending a plaintext password to the 
git clone call is an option, but I've got several git and several SVN 
repos, all connecting over SSH so the agent-play made more sense to me.

Cheers, Alex

-- 
You received this message because you are subscribed to the Google Groups 
"Puppet Users" group.
To view this discussion on the web visit 
https://groups.google.com/d/msg/puppet-users/-/_wHDatM6yEwJ.
To post to this group, send email to puppet-users@googlegroups.com.
To unsubscribe from this group, send email to 
puppet-users+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/puppet-users?hl=en.

Reply via email to