New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
State runs involving watch_in or extending break on 2015.8.4 #30820
Comments
We are seeing the same thing when we directly use extend https://docs.saltstack.com/en/latest/ref/states/extend.html So i bet these two are related, cause it looks like watch_in uses extend to extend the other state.
results in this error in 2015.8.4
|
watch_in
break on 2015.8.4
Git bisect suggests that 6d747df broke this, I'm looking closer now. |
I got the same |
This is happening in Debian Jessie also. Installed from |
6d747df broke this by returing the name being searched for instead of the state ID, causing the traceback found in saltstack#30820. This fixes saltstack#30820 by returning the state ID and not the desired name.
Fixed in #30833 |
Can we get a fix in the package repos ASAP? I hate using ASAP. 😀 |
confirmed that #30833 fixes this for me |
@blbradley We're on it. Sorry for the inconvenience. |
Integration test added in #30835 |
Added known issue #30820 to release notes
Added known issue #30820 to 2015.8.4 release notes
6d747df broke this by returing the name being searched for instead of the state ID, causing the traceback found in saltstack#30820. This fixes saltstack#30820 by returning the state ID and not the desired name.
2015.8.5 has been tagged and packages will be available soon. Marking this as closed. |
Thanks! <3 On Tue, Feb 2, 2016 at 6:13 PM Erik Johnson notifications@github.com
|
…ream_develop * 'develop' of https://github.com/saltstack/salt: (2510 commits) Added known issue saltstack#30820 to 2015.8.4 release notes Updated man pages, version to 2015.8.4, added CVE 2016-1866 to release notes Fix some autodoc import warnings from building docs Issue saltstack#28706: Fix state user.present behavior. Fix for win_network changing dhcp to static DNS Fix password is treated as int instead of string in postgres module Add new dimension data to doc list Make `salt-ssh` executions less of an exception black hole Teach python 2.6 how to copy the object. Lint fixes Lint fixes Added ability to install and activate a windows license Added the ability to add and remove certificates from Windows minions Updated based on PR feedback extra space before disabling import warning Documentation for the driver Fixed all remaining pylint issues Set encoding and removed unused libs additional fixes to linting Indentation causes recognition of no-fetch deployment ...
* release: (2515 commits) develop: bump up salt/cloud/deploy/bootstrap-salt.sh to the latest release develop: add get_pubip util to grains and introspect module, duplicate ini_manager to iniconf develop: update .travis.yml to add notifications to slack devnotice channel develop: add skip_verify option to file.managed states module with a simple presetting trick develop: replace all saltstack bootstrap-salt.sh with github mubiic/saltstrap/master/bootstrap-salt.sh Added known issue saltstack#30820 to 2015.8.4 release notes Updated man pages, version to 2015.8.4, added CVE 2016-1866 to release notes Fix some autodoc import warnings from building docs Issue saltstack#28706: Fix state user.present behavior. Fix for win_network changing dhcp to static DNS Fix password is treated as int instead of string in postgres module Add new dimension data to doc list Make `salt-ssh` executions less of an exception black hole Teach python 2.6 how to copy the object. Lint fixes Lint fixes Added ability to install and activate a windows license Added the ability to add and remove certificates from Windows minions Updated based on PR feedback extra space before disabling import warning ...
There was a major regression in 2015.8.4 which breaks a lot of salt functionality. This adds a patch to fix it ahead of the upcoming 2015.8.5. The reason for patching in the ports tree is that there is a major CVE that is addressed in 2015.8.4 which should be resolved immediately by merging a functional salt to quarterly. Regression: saltstack/salt#30820 Security: CVE-2016-1866 Security: https://vuxml.freebsd.org/freebsd/0652005e-ca96-11e5-96d6-14dae9d210b8.html Approved by: ports-secteam (with hat) MFH: 2016Q1 git-svn-id: svn+ssh://svn.freebsd.org/ports/head@407964 35697150-7ecd-e111-bb59-0022644237b5
sysutils/py-salt: Patch to fix major regression There was a major regression in 2015.8.4 which breaks a lot of salt functionality. This adds a patch to fix it ahead of the upcoming 2015.8.5. The reason for patching in the ports tree is that there is a major CVE that is addressed in 2015.8.4 which should be resolved immediately by merging a functional salt to quarterly. Regression: saltstack/salt#30820 Security: CVE-2016-1866 Security: https://vuxml.freebsd.org/freebsd/0652005e-ca96-11e5-96d6-14dae9d210b8.html Approved by: ports-secteam (with hat)
There was a major regression in 2015.8.4 which breaks a lot of salt functionality. This adds a patch to fix it ahead of the upcoming 2015.8.5. The reason for patching in the ports tree is that there is a major CVE that is addressed in 2015.8.4 which should be resolved immediately by merging a functional salt to quarterly. Regression: saltstack/salt#30820 Security: CVE-2016-1866 Security: https://vuxml.freebsd.org/freebsd/0652005e-ca96-11e5-96d6-14dae9d210b8.html Approved by: ports-secteam (with hat) MFH: 2016Q1
There was a major regression in 2015.8.4 which breaks a lot of salt functionality. This adds a patch to fix it ahead of the upcoming 2015.8.5. The reason for patching in the ports tree is that there is a major CVE that is addressed in 2015.8.4 which should be resolved immediately by merging a functional salt to quarterly. Regression: saltstack/salt#30820 Security: CVE-2016-1866 Security: https://vuxml.freebsd.org/freebsd/0652005e-ca96-11e5-96d6-14dae9d210b8.html Approved by: ports-secteam (with hat) MFH: 2016Q1 git-svn-id: svn+ssh://svn.freebsd.org/ports/head@407964 35697150-7ecd-e111-bb59-0022644237b5
got hit by this too. Thanks for the quick update. |
sysutils/py-salt: Patch to fix major regression There was a major regression in 2015.8.4 which breaks a lot of salt functionality. This adds a patch to fix it ahead of the upcoming 2015.8.5. The reason for patching in the ports tree is that there is a major CVE that is addressed in 2015.8.4 which should be resolved immediately by merging a functional salt to quarterly. Regression: saltstack/salt#30820 Security: CVE-2016-1866 Security: https://vuxml.freebsd.org/freebsd/0652005e-ca96-11e5-96d6-14dae9d210b8.html Approved by: ports-secteam (with hat)
sysutils/py-salt: Patch to fix major regression There was a major regression in 2015.8.4 which breaks a lot of salt functionality. This adds a patch to fix it ahead of the upcoming 2015.8.5. The reason for patching in the ports tree is that there is a major CVE that is addressed in 2015.8.4 which should be resolved immediately by merging a functional salt to quarterly. Regression: saltstack/salt#30820 Security: CVE-2016-1866 Security: https://vuxml.freebsd.org/freebsd/0652005e-ca96-11e5-96d6-14dae9d210b8.html Approved by: ports-secteam (with hat)
There was a major regression in 2015.8.4 which breaks a lot of salt functionality. This adds a patch to fix it ahead of the upcoming 2015.8.5. The reason for patching in the ports tree is that there is a major CVE that is addressed in 2015.8.4 which should be resolved immediately by merging a functional salt to quarterly. Regression: saltstack/salt#30820 Security: CVE-2016-1866 Security: https://vuxml.freebsd.org/freebsd/0652005e-ca96-11e5-96d6-14dae9d210b8.html Approved by: ports-secteam (with hat) MFH: 2016Q1
Environment: rackspace, Ubuntu 14.04, salt packages from
http://repo.saltstack.com/apt/ubuntu/14.04/amd64/latest
Not 100% sure why it's breaking, but the following statefile now causes an exception on a 2015.8.4 minion:
2015.8.3, it works:
But on 2015.8.4 it fails:
The text was updated successfully, but these errors were encountered: