From 9642cd7ae24f0ba79ce5647c709b35ae8f06a285 Mon Sep 17 00:00:00 2001 From: Jasper Ras Date: Sun, 19 Jan 2025 21:14:51 +0100 Subject: vault backup: 2025-01-19 21:14:51 --- 3 Resources/Puppet/Sensitive type.md | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) create mode 100644 3 Resources/Puppet/Sensitive type.md (limited to '3 Resources/Puppet/Sensitive type.md') diff --git a/3 Resources/Puppet/Sensitive type.md b/3 Resources/Puppet/Sensitive type.md new file mode 100644 index 0000000..eed8e85 --- /dev/null +++ b/3 Resources/Puppet/Sensitive type.md @@ -0,0 +1,17 @@ +--- +tags: + - puppet +references: + - https://www.puppet.com/docs/puppet/7/lang_data_sensitive.html +--- +Cannot be used as a typedef in the class arguments because hieradata doesn't pass it as such but as a regular string. + +The `unwrap` method gives access to the original data. + +It doesn't encrypt anything - its only purpose is the hiding of data from logs and reports. + +To use Sensitive with a template we can wrap the `template` reference in it. Such as this: +``` +'/etc/dnsdist/dnsdist.conf': + content => Sensitive(template('profile/application/dnsdist.conf.erb')); +``` -- cgit v1.2.3