-
Notifications
You must be signed in to change notification settings - Fork 614
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix command shell escaping #1240
Conversation
670d879
to
a6bf068
Compare
Codecov Report
@@ Coverage Diff @@
## main #1240 +/- ##
==========================================
+ Coverage 65.81% 66.09% +0.27%
==========================================
Files 14 14
Lines 351 348 -3
==========================================
- Hits 231 230 -1
+ Misses 120 118 -2
Continue to review full report at Codecov.
|
f2bc68b
to
7717c46
Compare
f4453ca
to
7717c46
Compare
7717c46
to
c73a37b
Compare
1b5e162
to
08a1752
Compare
The rhel-7, puppet7-nightly failure is IAC-1420, so we can ignore that and get this merged and released on Monday. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I love it when you have more functionality with less code. I also hate it when code tries to join commands when you can actually pass an array of arguments. Big 👍 for this direction.
Not sure if this introduced it, but in another module I started to see:
|
|
@DavidS , I think |
#1253 is another regression I found with this PR. |
This changes a couple of places where the postgresql module was passing unsafe values through a shell to avoid the shell altogether.
Big thanks to @smortex for reporting the issue.