> Passwords must be at at least seven characters in length, and must not contain spaces, single or double quotation marks (' or "), exclamation marks (!), or dollar signs ($)
By the way: 83k+ commits and 15k+ tags. There are seven programming languages in the main repository. Sounds impenetrable. PRs merged with failing tests and developers not following their own requirements, example: https://github.com/uyuni-project/uyuni/pull/7243#issuecommen....
Regarding that not following the developer rules, that specific commit was removing a module, which also removes the changes file for that module. The developer could not add a change log to a file there.
The check is blind, so it returns the alert, but in this case can be ignored.
Not sure where the dislike comes from, when all configuration management tools have issues with "orphaned nodes". I've even have small bugs/misconfigurations in fully push/declarative setups with Terraform packages where they stopped identifying updates correctly. If anything, with a push tool like Terraform reporting that it did what it planned on doing successfully, its arguably easier to not notice something has been orphaned since you won't have any signal back that something is "wrong", an orphaned configuration node has nothing to do and therefore is already "correct". Salt may have its flaws, but I find it hard to argue that "orphaned nodes" is any more of a flaw of salt than it is of cfEngine, Chef, Ansible, Puppet, Terraform, Helm Charts, Kubernetes Operators, or any other "configuration management tool".
Also...
Salt does have High Availability options, https://docs.saltproject.io/en/latest/topics/highavailabilit... with Replication/Failover and Multi-Master modes, and there's also "Syndic" which break up how much each master is responsible for in order to create failure domains or separate responsibilities between stacks of infrastructure like having one per datacenter... oh and the underlying data stores that masters and syndic daemons rely on can be setup with highly configurations since you can keep the cached data in Redis, Consul, EtcD, or MySQL...
Salt is a bit complicated, but just can't understand where you're coming from here. I've never used a configuration management system that wasn't a bit complicated in one way or another, their job is to be the sin-eater of the complexity that is inherent in managing computers and software.
I think the new ansible docs are opaque, and the new "everything is an ansible collection" scheme makes troubleshooting any issues reported by users hundreds of times harder than "the old days"
Kinda sucks that a distro neutral configuration manager would mandate that it has to run on SuSE. Most people who actually need CM don't want to take another major vendor through compliance just to roll out a tool.
In any case, "machines" are well trodden ground. It's all the random "smart" network devices and "cloud services" that make documenting and auditing configuration absolute tedium today.
OpenSUSE to be precise. Having participated in a few of their community hours and learned that they are actively working on containerizing the server. This approach will eliminate the need for specific requirements and allow the server to run seamlessly on top of any distribution.
> Passwords must be at at least seven characters in length, and must not contain spaces, single or double quotation marks (' or "), exclamation marks (!), or dollar signs ($)
bahahahahaaha, whaaaaat is going on here?!
---
In an effort to be constructive, previously: https://news.ycombinator.com/item?id=31115254 (60 pt, 7 comments)