-
-
Notifications
You must be signed in to change notification settings - Fork 59
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow the password to be a Sensitive string. #150
Conversation
I guess we already use Sensitive here. puppet-chrony/manifests/config.pp Line 27 in f53ea01
but this means that we won't store the password as a parameter of the main class in PuppetDB?? |
In theory that should only impact folks who pass in a |
But only if you're on Puppet 6.24.0 or later. Before then, |
Which is probably fine. But you'd need to update the metadata.json and mark this as breaking. Alternatively, you need to conditionally unwrap the variable depending on its type. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
A decision needs to be made about either bumping the minimum puppet version in metadata.json and marking this as breaking, or adding the additional logic so that unwrap
isn't called if the data type isn't Sensitive
.
In theory I've reworked the template to better behavior with older puppet. I may be missing something on the breaking change part.... as I understand it, unless someone explicitly passes in the argument as |
For folks doing mass casting of .*password.* to Sensitive, this should help keep chrony working as expected.
Pull Request (PR) description
For folks doing mass casting of .password. to Sensitive,
this should help keep chrony working as expected.
This Pull Request (PR) fixes the following issues
N/A