Hi,
Am Di., 12. März 2019 um 11:54 Uhr schrieb Henrik Lindberg
<henrik.lindb...@puppet.com>:
> Yeah - sigh... The vault lookup returns an instance of Sensitive which
> get / dig cannot dig into. We could possibly allow digging into a
> Sensitive value as the result would also be made sensitive, but that
> function does not do that. (Please file a ticket).

Just for completeness and in case anyone stumbling over this thread
might not know it: You always have also the option to deploy a
consul-template (https://github.com/hashicorp/consul-template) config
with puppet and then let consult-template request the secrets from the
vault instance locally on the server. What's nice about that is that
it decouples for example vault secret renewals from the actual puppet
runs.

Best regards,
Karsten

-- 
You received this message because you are subscribed to the Google Groups 
"Puppet Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to puppet-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/puppet-users/CAL017hAX_cJWDRcZpfWUaYq53-kueuh1NmpBi-XiCAvp24JTUw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to