-
Notifications
You must be signed in to change notification settings - Fork 794
Escape $root_password during execs. #73
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
With single quotes, I believe puppet will then treat ${root_password} as a literal string? |
No need to escape the single quotes. Puppet is smarter than bash. |
Please update the spec tests for your change. Currently they expect un-escaped passwords and will fail when run on your branch. |
Spec tests updated. |
@razorsedge a general overcommitment from both of us, combined with a lack of automated integration tests :) |
Sorry this got lost in the shuffle! Unfortunately, it no longer merges cleanly. If you could squash your commits and rebase this I see no reason we can't merge it at that point. |
Some characters used in a password can cause the shell in an exec to do unexpected things unless the password is enclosed in single quotes. Updated the rspec tests to deal with the password quoting.
I finally found the time to work on this. And I think I managed to figure out rebasing. |
Escape $root_password during execs.
(FM-7720/FM-7722/FM-7723) Consolidate Windows Metadata
Some characters used in a password can cause the shell in an exec to do
unexpected things unless the password is enclosed in single quotes.
Try putting ';' in the middle of your password to test how interestingly it fails.