Skip to content

[Feature request]: make exec more secure #13

@tuxmea

Description

@tuxmea

Use Case

Using exec resource wthout checking idempotency is a bad pattern, as the exec gets executed every time.
Idempotency is possible by setting one of the following parameters:

  • creates
  • onlyif
  • unless
  • refreshonly

OpenVox should let users/developers know that they are using code on bad practice.

There are two was on how to achieve this:

  1. a lint plugin which identifies if an exec has the idempotency parameters set (out of scope for this project)
  2. let the type check if all desired parameters are set

Describe the solution you would like

The exec type should check if any of the idempotency attributes in use and print a warning (on the agent side) to inform users about this bad practice.

Describe alternatives you've considered

No response

Additional context

No response

Metadata

Metadata

Assignees

No one assigned

    Labels

    enhancementNew feature or request

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions