20:00:00 #startmeeting Ansible Windows Working Group 20:00:00 Meeting started Tue Apr 5 20:00:00 2022 UTC. 20:00:00 This meeting is logged and archived in a public location. 20:00:00 The chair is nitzmahone. Information about MeetBot at https://fedoraproject.org/wiki/Zodbot#Meeting_Functions. 20:00:00 Useful Commands: #action #agreed #halp #info #idea #link #topic. 20:00:00 The meeting name has been set to 'ansible_windows_working_group' 20:00:08 bam 20:00:12 heyy 20:00:12 #chair jborean93 20:00:12 Current chairs: jborean93 nitzmahone 20:00:19 hey hey 20:00:22 hey 20:00:32 #info agenda https://github.com/ansible/community/issues/644 20:00:36 nothing there so 20:00:39 #topic open floor 20:01:18 I've got nothing interesting to add, it's been a while since the last collection release so I'm probably going to do that this week or next 20:01:24 nice 20:01:34 I got nothing much 20:02:02 Matt C and I were talking about some CI stuff- we might try to move some of the win_reboot stuff that's causing that test to fail to a unit test on the action 20:02:18 the incidental test? 20:02:32 We really don't need to rapid-fire it that way 20:02:39 Yeah 20:03:03 (though unless the real test has changed, I assume it'd suffer from the same problem) 20:03:08 I know the last time I briefly looked at it we wanted to try and enable reboot testing for the remote CI instances like RHEL, macOS, FreeBSD 20:03:45 That as well- he's got some stuff going that will properly separate the controller/remote groups so that can be done safely 20:03:54 nice 20:03:54 (on pure remote targets anyway) 20:05:20 The one that has problems (maybe it was only in 2.9, can't remember where all it lives now), rebooted the host again *immediately* after it came up, and sometimes the shutdown command fails 20:06:00 Not really much we could do there short of adding an arbitrary delay, but what the second reboot was testing could be equally well covered by a unit test, and much more cheaply :D 20:06:45 Anyway, nothing exciting from me... 20:06:59 * nitzmahone wonders if briantist's packet sniffing bore fruit last week 20:07:06 yes, I figured out my DNS problem (&@#$%^ VPN client software) 20:07:10 hahaha 20:07:21 Been there 20:08:06 Well, if no new topics, we'll close at 10 after 20:08:15 I'm all good, got to get back to CI bashing 20:08:16 it has a "feature", which prevents the client from using any DNS servers other than the ones they set, and the feature: only work on Windows, doesn't work with TCP DNS requests, and is on by default 20:08:27 ugh 20:08:41 So it was jacked under WSL then? 20:08:58 so, everyone else I asked to try (on Macs) didn't see an issue, explains why my TCP requests worked, and explains why the networking team was not previously aware of it 20:09:14 well, WSL uses the host's networking, it all had to go through the VPN 20:09:30 Windows VMs on macs were not affected, because the VPN software is on the mac side 20:09:50 good times 20:09:52 heh, sounds like fun :) 20:09:56 at least you figured it out 20:09:58 yup. glad that's over at least 20:10:30 I ended up giving up testing cert auth in GHA CI 20:10:37 What I thought the issue was, was not actually it 20:10:54 oh? 20:10:59 Oh noes, what will the teeming masses that rely on that do? ;) 20:11:05 ha 20:11:20 on a brighter side, httpx allows you to use a password protected key 20:11:31 bout damn time 20:11:33 allows you to specify a password to decrypt it which is nice 20:11:47 I wrote a PR for requests to do that, but I think they didn't like something about it, so I never went back to it 20:12:11 it honestly is pretty simple, the work is done on the SSLContext through a single method 20:12:29 I remember it being harder than it should've been for requests, but I don't recall why- twas several years ago 20:12:59 yea most likely an improvement to the `ssl` module has made it a lot easier 20:13:09 3.x brought a lot of nice things to that 20:13:34 https://docs.python.org/3/library/ssl.html#ssl.SSLContext.load_cert_chain - looks like it was 3.3 that added the password option 20:13:50 Yeah, that would certainly make it a lot easier :D 20:14:17 I might've been `ctypes`ing out to something which was why they didn't like it 20:14:34 So I lied it wasn't really httpx that made it easier, rather they accept the `SSLContext` directly and pypsrp can call this 20:15:55 The "you have to use an unencrypted key" thing was the way I usually talked $enterprise_users out of cert auth (when I couldn't get them to understand how awful it is to maintain in the first place) 20:16:19 lolll 20:16:27 (oh, and that you *also* still have to maintain the local user's password) 20:16:46 🤷‍♂️"yeah sorry, I dunno, nobody supports encrypted keys" 20:17:43 + only works for local users 20:17:44 IIRC most of the time that came up with was Linux admins that didn't know much about Windows and really seized on the cert auth as an analogue for SSH key auth on Windows 20:18:01 "no, it's really not the same at all, and you don't want it" 20:18:05 the "only local users" thing is the strongest nail in the coffin imo 20:18:09 definitely 20:18:22 But the way the mapping is maintained is also pretty awful 20:18:27 right 20:18:58 If you could just splat a cert issuer/thumbprint/whatever in AD and it worked, holy crap, that'd be awesome 20:19:22 seriously, that'd be a gamechanger 20:19:34 I never really understood why they didn't do that, because that's basically how smartcard/PIV auth works 20:20:03 isn't that what Kerberos + PKINIT is meant for 20:20:18 (one of the things) 20:20:19 I get the feeling that cert auth was some thing they put it in to appease some VERY BIG CLIENT that paid them to, and the way it works is because that's exactly how that company wanted to use it 20:20:37 IIRC it's part of the CIM standard 20:20:41 CIM/WSMan 20:21:08 Then again so is `Digest` and they just state it doesn't work so you are probably right :) 20:21:44 Heh, I always remember thinking `Digest` would solve a lot of auth problems back when I used to host authenticated apps in IIS, but never once did it actually :D 20:21:55 `ReadersDigest` enter your subscription number and UPC code from the latest issue (two factor) 20:22:09 Ms. Chanandler Bong 20:22:15 (oh wait, that was TV Guide) 20:22:31 * jborean93 ffs CI, why don't you fail when I need you to 20:22:32 same demographic 20:23:16 jborean93: runme.sh test and forgot `set -eux`? ;) 20:23:27 unfortunately it's a pytest failure 20:23:45 https://github.com/jborean93/pypsrp/blob/44511d4eee2a46f07410abcc5a2100a7939ff770/tests/tests_psrp/test_sync.py#L940-L959 is failing with https://github.com/jborean93/pypsrp/runs/5828263213?check_suite_focus=true 20:23:54 > psrp._exceptions.PipelineFailed: A parameter cannot be found that matches parameter name 'Name'. 20:24:12 For whatever reason it's only on the sync test, async hasn't failed yet 20:24:50 also good 20:24:51 async can't fail if you never check the result [thinking guy meme] 20:24:51 times 20:25:34 Heh, ansible should add some checks on that like Python and C# have :D 20:25:42 I'm trying to run only that test right now with debug logs enabled but no luck. Might have to just run the whole test suite with debug logs which takes a lot longer 20:25:50 ("hey, you never `await`ed this thing") 20:27:43 welp, til next week- thanks all! 20:27:45 #endmeeting