15:00:01 #startmeeting Ansible Core Meeting 15:00:01 Meeting started Thu May 25 15:00:01 2017 UTC. The chair is thaumos. Information about MeetBot at http://wiki.debian.org/MeetBot. 15:00:01 Useful Commands: #action #agreed #halp #info #idea #link #topic. 15:00:01 The meeting name has been set to 'ansible_core_meeting' 15:00:05 #chair thaumos 15:00:05 Current chairs: thaumos 15:00:40 howdy 15:00:46 #chair sivel 15:00:46 Current chairs: sivel thaumos 15:00:50 hello 15:01:05 * gundalow waves 15:01:11 #chair gundalow 15:01:11 Current chairs: gundalow sivel thaumos 15:01:29 * thaumos waves back 15:02:16 hey 15:02:31 * jtanner was signing up for openshift stuff and forgot to look at this screen 15:02:45 #chair jtanner 15:02:45 Current chairs: gundalow jtanner sivel thaumos 15:02:54 * akasurde waves 15:02:59 #chair akasurde 15:02:59 Current chairs: akasurde gundalow jtanner sivel thaumos 15:03:00 hi All 15:03:57 I'll give two more minutes before we start 15:05:45 #topic Feedback asked for ansible/ansible#24822 15:06:08 #link https://github.com/ansible/ansible/pull/24822 15:06:32 @akasurde is there any specific feedback you are looking for? 15:07:08 yes, As per my testing this is working as per requirements in bug. Looking for feedback from Core team 15:07:14 akasurde: Maybe an example showing you can use this to *only* install security updates 15:07:38 i wonder how we can test this 15:07:39 thaumos, once this is merge I start working on --cve and --advisories 15:08:07 jtanner, if there is security update for package we can specify --security update 15:08:12 gundalow, Sure 15:08:31 akasurde: i meant within the integration tetss 15:08:46 jtanner, ohk 15:08:53 * akasurde thinking 15:09:03 could it be tested by spinning up a centos 7 system and just calling the module. I think it's somewhat safe to assume an image may not have all security updates applied 15:09:23 depends on the dockerfile and last build time 15:09:25 in integration testing, I am sure the same applies as well. 15:09:30 * thaumos nods 15:10:11 i suppose we don't have to have a test right now, but i can see this being one of those "ZOMG, YOU MUST FIX IT NOW!" features 15:10:11 I wonder if you'd need to downgrade a package, not sure if that's possible with yum 15:10:53 so before this gets merged, I think we should require integration tests updated to test this as well. 15:10:56 gundalow, yes that can be done. 15:11:08 https://access.redhat.com/solutions/29617 15:11:13 yum downgrade foo 15:11:32 @akasurde, can you test this, and think about how to do this in integration tests? 15:11:47 so maybe an integration test that rolls back a specific package first and then checks for security update? 15:11:50 jtanner, I am not sure if we can unroll security update 15:11:57 jtanner, but I will try 15:11:59 really? hrmm 15:12:02 thaumos, Yes sure 15:12:22 jtanner, I will try this today and will let you know 15:12:29 #action akasurde to test rolling back specific pkg using yum module and then security parameter 15:12:38 +1 15:12:40 thaumos, cool 15:12:47 (back in 5) 15:12:50 #action akasurde to investigate how to implement security parameter in integration test for yum module 15:12:51 akasurde: i'd offer more advice, but i'm not sure what packages usually fall under "security" besides kernel/glibc 15:13:08 ssh? 15:13:26 jtanner, A lot of them, samba, nfs etc. 15:13:39 so samba is probably not installed in our test containers 15:13:53 jtanner, even product like FreeIPA gets security patches 15:13:56 you could install n-2 version and then use your feature to upgrade it 15:14:32 just a thought 15:14:48 jtanner, Yes sure 15:15:06 anything else, if not let's move on 15:15:11 anything else. Once this is done I will start with cve and advisories 15:15:16 +1 on feature from me 15:15:47 +1 from me too 15:15:52 okay, moving on 15:16:00 #topic ansible/ansible#24867 15:16:15 #link https://github.com/ansible/ansible/pull/24867 15:16:32 @bcoca, are you lurking? 15:16:34 dag-: ? 15:16:41 ^^ 15:17:02 no 15:17:16 Looks like a vote was asked for 15:17:20 -1 for me 15:17:48 im +1, this should not break anything and ensures uniform returns 15:18:00 there's not enough explanation in PR for me to make judgement 15:18:39 I am a -1 as that is a lot of changes to keep current behavior, and fix a small number of issues. I'm more in favor of just making the changes where needed, instead of everywhere 15:18:54 well, he mixes several issues 'rc' return and failure handling , 'failed' and 'changed' always being present .. so PR is a bit overloaded 15:19:21 sivel: agreed, so my +1 is for changed/failed always present, -1 on PR as it does too much 15:19:33 so ... win_chocolatey should get it's own targeted fix first? 15:19:42 hi. I've not seen this 'non-zero return code is actually success' with chocolatey but have seen talk of it when installing packages - sometimes you get something like 3010 which means 'installed, but you need to reboot'. 15:19:47 #chair jhawkesworth 15:19:47 Current chairs: akasurde gundalow jhawkesworth jtanner sivel thaumos 15:19:54 #chair bcoca 15:19:54 Current chairs: akasurde bcoca gundalow jhawkesworth jtanner sivel thaumos 15:20:19 windows does not have the POSIX requirement of rc codes being 0 for success 15:20:35 I've ran into some of the same issues that 24867 is aiming for, albeit usually while debugging/troubleshooting obtuse module failures 15:20:38 windows also has lot of crappy installers 15:20:43 #chair alikins 15:20:43 Current chairs: akasurde alikins bcoca gundalow jhawkesworth jtanner sivel thaumos 15:20:50 windows is crappy 15:21:01 +1 15:21:24 I think it is fair to ask to be specific on making a fix for what the issue is opened for. 15:21:38 i would make it 2 or 3 issues 15:21:47 * thaumos nods 15:21:53 1) changed/failed presense 2) rc issue on win_ 3) rc elsewhere 15:22:19 bcoca: agreed 15:22:27 he tends to overload PRs a lot 15:22:28 there's some code reformatting in the PR too 15:22:48 I'd like to see explicit testing for the functionality as well 15:24:08 for the changed/failed presence functionality, @gundalow? 15:24:52 i'm starting to think we should just take it 15:25:21 a lot of the tests (he corrcts them) look for 'failed' being missing as success .. incorrectly so 15:25:34 yeah 15:25:42 +1 to merge ... might as well 15:28:06 if we do merge, should we still have follow up for 2 & 3 mentioned by bcoca? 15:28:57 its all in there 15:29:00 thaumos: yup 15:29:01 that is the problem 15:29:10 too many things 15:30:23 ah, okay... I should have looked at files changed. 15:30:29 I was stuck on the issue name 15:30:59 I think we should be specific per issue. It will be easier to track to a single commit 15:31:21 ^ that is where sivel and i are at 15:31:46 * thaumos nods 15:32:29 ok 15:32:57 bcoca, can you update the ticket? 15:33:20 ask dag to make two follow up issues for win_* and one for everything else. 15:34:05 It's totally fair to ask to not overload issues. It's easy enough to amend a commit and create pr's individually 15:35:47 or I can 15:36:41 #action thaumos to update #24687 asking dag to make this pr for only changed/failed presence. 15:36:56 Thanks thaumos 15:37:12 #action thaumos to also ask dag to create individual prs for rc issue on win_* and everything else. 15:37:32 #topic ansible/ansible#24871 15:37:45 #link https://github.com/ansible/ansible/pull/24871 15:38:21 In an answer to the comment left by bcoca on this issue, I think it should either 15:38:35 1) handled specially in individual modules 15:39:02 sivel +1 15:39:03 2) We add another param to the argspec that indicates whether the supplied value must not be None 15:39:20 which is still specified at the individual module level 15:39:41 But not sure it is worth the effort right now to add the additional argspec option 15:39:43 Yes I like combination of both, Let module decide what to do 15:43:06 @sivel, that being said is there something akasurde could do quickly in the meantime to solve the one issue, and then we have something on a 2.5 milestone to cover the rest? 15:43:29 I believe that PR already handles it with #1 15:43:30 or with guidance, is something akasurde could do for 2.4? 15:44:03 right, and are we fine with that with a contingency that akasurde will follow up with doing it the right/preferred way 15:44:49 I think if we were to discuss #2, that should be a larger discussion here. Currently handling it as a 1 off is fine imo 15:45:11 * thaumos nods 15:45:14 which I think is what bcoca likely added it to the agenda for 15:45:17 same here 15:45:18 yep 15:45:25 but doesn't look like we are getting that discussion today :) 15:45:27 I figured he did, but he's afk 15:45:30 exactly 15:45:48 so that being said, can we get +1's to merge this, and revisit this again? 15:45:54 I am +1 15:46:07 +1 to merge PR as it stands 15:46:18 jtanner, thoughts? 15:46:45 24817? 15:46:52 24871 15:46:52 yes 15:47:06 https://github.com/ansible/ansible/pull/24871 15:48:07 if people need to set null/blank vals for sysctl, i guess we need this 15:48:19 k 15:48:34 another thing we should probably have a test for 15:48:56 i would open a new bug with "sysctl null/blank vals missing tests" and assign to akasurde 15:49:02 Who'd like to do the merge action for the PR? 15:49:02 after this one is merged 15:49:15 +1 to test issue suggestion 15:49:25 it's done 15:49:31 👍 15:49:47 I'm however unsure exactly why we are passing None, but hey, who am I to judge :) 15:49:59 #action jtanner merged pr 15:50:11 what was the original intention? these are lifes great questions 15:50:21 #action akasurde to pr/issue "sysctl null/blank vals missing tests" 15:50:32 jtanner, Do you know any example where people will set any blank or null vaule to kernel param 15:50:49 #action thaumos to revisit greater discussion of argspec None type for all modules. 15:51:05 jtanner, thanks for merge 15:51:37 akasurde: i would try to copy what is in the initial bug report 15:52:21 jtanner, Ok 15:52:26 akasurde: https://github.com/ansible/ansible/issues/25035 15:52:39 jtanner, I am on it :) 15:52:43 thanks 15:53:06 #topic Open Floor 15:53:28 Anything else people want to bring up in the last few minutes? 15:53:43 #topic Module argspec validation 15:54:33 sivel: validate-modules has the ability to ensure that DOCUMENTATION matches argspec. I know it's slow to run across all modules as once, though for PRs that touch modules, do you thik it may be useful to run in CI? 15:55:17 probably. however it would could limit it to the specific module that would be best I think 15:55:21 ack 15:55:27 cool, I'll have a look at that 15:55:31 #topic Open Floor 15:55:37 Also, I haven't really played with that functionality in a while. Let me know if you run into any issues 15:56:36 ansible's 3nd(?) SIG [after networking and windows] is now vmware ... join #ansible-vmware if you want to get SOAPy 15:57:04 jtanner, +1 SOAPy hehe 15:57:07 s/3nd/3rd 15:57:49 are you washing your mouth with that soap? 15:58:13 something like that 15:58:18 Laugh a lot 15:58:19 lol 15:58:23 alright 15:58:30 thanks for the discussion today folks! 15:58:35 #endmeeting