From 974997594fc453ddee3b374807cb654a98bd2f28 Mon Sep 17 00:00:00 2001 From: Felix Fontein Date: Tue, 9 Feb 2021 13:34:53 +0100 Subject: [PATCH] Release 2.0.1. --- CHANGELOG.rst | 63 ++++++++++ changelogs/changelog.yaml | 115 ++++++++++++++++++ ...lesystem-fix-1457-resizefs-idempotency.yml | 5 - ...d-id-props-to-redfish-inventory-output.yml | 2 - .../fragments/1695-parted-updatedregex.yaml | 4 - .../1703-sensu_silence-fix_json_parsing.yml | 2 - ...ixes-for-updating-existing-gitlab-user.yml | 2 - changelogs/fragments/2.0.1.yml | 1 - .../fragments/CVE-2021-20191_no_log.yml | 4 - changelogs/fragments/dellemc-migration.yml | 10 -- changelogs/fragments/no_log-fixes.yml | 25 ---- galaxy.yml | 2 +- 12 files changed, 179 insertions(+), 56 deletions(-) delete mode 100644 changelogs/fragments/1478-filesystem-fix-1457-resizefs-idempotency.yml delete mode 100644 changelogs/fragments/1691-add-name-and-id-props-to-redfish-inventory-output.yml delete mode 100644 changelogs/fragments/1695-parted-updatedregex.yaml delete mode 100644 changelogs/fragments/1703-sensu_silence-fix_json_parsing.yml delete mode 100644 changelogs/fragments/1724-various-fixes-for-updating-existing-gitlab-user.yml delete mode 100644 changelogs/fragments/2.0.1.yml delete mode 100644 changelogs/fragments/CVE-2021-20191_no_log.yml delete mode 100644 changelogs/fragments/dellemc-migration.yml delete mode 100644 changelogs/fragments/no_log-fixes.yml diff --git a/CHANGELOG.rst b/CHANGELOG.rst index f9593d9cc8..c39cf5b599 100644 --- a/CHANGELOG.rst +++ b/CHANGELOG.rst @@ -6,6 +6,69 @@ Community General Release Notes This changelog describes changes after version 1.0.0. +v2.0.1 +====== + +Release Summary +--------------- + +Bugfix and security bugfix (potential information leaks in multiple modules, CVE-2021-20191) release. + +Major Changes +------------- + +- For community.general 3.0.0, the ``ome_device_info``, ``idrac_firmware`` and ``idrac_server_config_profile`` modules will be moved to the `dellemc.openmanage `_ collection. + A redirection will be inserted so that users using ansible-base 2.10 or newer do not have to change anything. + + If you use Ansible 2.9 and explicitly use the DellEMC modules mentioned above from this collection, you will need to adjust your playbooks and roles to use FQCNs starting with ``dellemc.openmanage.`` instead of ``community.general.``, + for example replace ``community.general.ome_device_info`` in a task by ``dellemc.openmanage.ome_device_info``. + + If you use ansible-base and installed ``community.general`` manually and rely on the DellEMC modules mentioned above, you have to make sure to install the ``dellemc.openmanage`` collection as well. + If you are using FQCNs, for example ``community.general.ome_device_info`` instead of ``ome_device_info``, it will continue working, but we still recommend to adjust the FQCNs as well. + +Breaking Changes / Porting Guide +-------------------------------- + +- utm_proxy_auth_profile - the ``frontend_cookie_secret`` return value now contains a placeholder string instead of the module's ``frontend_cookie_secret`` parameter (https://github.com/ansible-collections/community.general/pull/1736). + +Security Fixes +-------------- + +- dnsmadeeasy - mark the ``account_key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- gitlab_runner - mark the ``registration_token`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- hwc_ecs_instance - mark the ``admin_pass`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- ibm_sa_host - mark the ``iscsi_chap_secret`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- keycloak_* modules - mark the ``auth_client_secret`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- keycloak_client - mark the ``registration_access_token`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- librato_annotation - mark the ``api_key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- logentries_msg - mark the ``token`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- module_utils/_netapp, na_ontap_gather_facts - enabled ``no_log`` for the options ``api_key`` and ``secret_key`` to prevent accidental disclosure (CVE-2021-20191, https://github.com/ansible-collections/community.general/pull/1725). +- module_utils/identity/keycloak, keycloak_client, keycloak_clienttemplate, keycloak_group - enabled ``no_log`` for the option ``auth_client_secret`` to prevent accidental disclosure (CVE-2021-20191, https://github.com/ansible-collections/community.general/pull/1725). +- nios_nsgroup - mark the ``tsig_key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- oneandone_firewall_policy, oneandone_load_balancer, oneandone_monitoring_policy, oneandone_private_network, oneandone_public_ip - mark the ``auth_token`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- ovirt - mark the ``instance_key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- ovirt - mark the ``instance_rootpw`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- pagerduty_alert - mark the ``api_key``, ``service_key`` and ``integration_key`` parameters as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- pagerduty_change - mark the ``integration_key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- pingdom - mark the ``key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- pulp_repo - mark the ``feed_client_key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- rax_clb_ssl - mark the ``private_key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- redfish_command - mark the ``update_creds.password`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- rollbar_deployment - mark the ``token`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- spotinst_aws_elastigroup - mark the ``multai_token`` and ``token`` parameters as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- stackdriver - mark the ``key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- utm_proxy_auth_profile - enabled ``no_log`` for the option ``frontend_cookie_secret`` to prevent accidental disclosure (CVE-2021-20191, https://github.com/ansible-collections/community.general/pull/1725). +- utm_proxy_auth_profile - mark the ``frontend_cookie_secret`` parameter as ``no_log`` to avoid leakage of secrets. This causes the ``utm_proxy_auth_profile`` return value to no longer containing the correct value, but a placeholder (https://github.com/ansible-collections/community.general/pull/1736). + +Bugfixes +-------- + +- filesystem - do not fail when ``resizefs=yes`` and ``fstype=xfs`` if there is nothing to do, even if the filesystem is not mounted. This only covers systems supporting access to unmounted XFS filesystems. Others will still fail (https://github.com/ansible-collections/community.general/issues/1457, https://github.com/ansible-collections/community.general/pull/1478). +- gitlab_user - make updates to the ``isadmin``, ``password`` and ``confirm`` options of an already existing GitLab user work (https://github.com/ansible-collections/community.general/pull/1724). +- parted - change the regex that decodes the partition size to better support different formats that parted uses. Change the regex that validates parted's version string (https://github.com/ansible-collections/community.general/pull/1695). +- redfish_info module, redfish_utils module utils - add ``Name`` and ``Id`` properties to output of Redfish inventory commands (https://github.com/ansible-collections/community.general/issues/1650). +- sensu-silence module - fix json parsing of sensu API responses on Python 3.5 (https://github.com/ansible-collections/community.general/pull/1703). + v2.0.0 ====== diff --git a/changelogs/changelog.yaml b/changelogs/changelog.yaml index b6e66c30ad..68583056bb 100644 --- a/changelogs/changelog.yaml +++ b/changelogs/changelog.yaml @@ -1000,3 +1000,118 @@ releases: name: yum_versionlock namespace: packaging.os release_date: '2021-01-28' + 2.0.1: + changes: + breaking_changes: + - utm_proxy_auth_profile - the ``frontend_cookie_secret`` return value now contains + a placeholder string instead of the module's ``frontend_cookie_secret`` parameter + (https://github.com/ansible-collections/community.general/pull/1736). + bugfixes: + - filesystem - do not fail when ``resizefs=yes`` and ``fstype=xfs`` if there + is nothing to do, even if the filesystem is not mounted. This only covers + systems supporting access to unmounted XFS filesystems. Others will still + fail (https://github.com/ansible-collections/community.general/issues/1457, + https://github.com/ansible-collections/community.general/pull/1478). + - gitlab_user - make updates to the ``isadmin``, ``password`` and ``confirm`` + options of an already existing GitLab user work (https://github.com/ansible-collections/community.general/pull/1724). + - parted - change the regex that decodes the partition size to better support + different formats that parted uses. Change the regex that validates parted's + version string (https://github.com/ansible-collections/community.general/pull/1695). + - redfish_info module, redfish_utils module utils - add ``Name`` and ``Id`` + properties to output of Redfish inventory commands (https://github.com/ansible-collections/community.general/issues/1650). + - sensu-silence module - fix json parsing of sensu API responses on Python 3.5 + (https://github.com/ansible-collections/community.general/pull/1703). + major_changes: + - 'For community.general 3.0.0, the ``ome_device_info``, ``idrac_firmware`` + and ``idrac_server_config_profile`` modules will be moved to the `dellemc.openmanage + `_ collection. + + A redirection will be inserted so that users using ansible-base 2.10 or newer + do not have to change anything. + + + If you use Ansible 2.9 and explicitly use the DellEMC modules mentioned above + from this collection, you will need to adjust your playbooks and roles to + use FQCNs starting with ``dellemc.openmanage.`` instead of ``community.general.``, + + for example replace ``community.general.ome_device_info`` in a task by ``dellemc.openmanage.ome_device_info``. + + + If you use ansible-base and installed ``community.general`` manually and rely + on the DellEMC modules mentioned above, you have to make sure to install the + ``dellemc.openmanage`` collection as well. + + If you are using FQCNs, for example ``community.general.ome_device_info`` + instead of ``ome_device_info``, it will continue working, but we still recommend + to adjust the FQCNs as well. + + ' + release_summary: Bugfix and security bugfix (potential information leaks in + multiple modules, CVE-2021-20191) release. + security_fixes: + - dnsmadeeasy - mark the ``account_key`` parameter as ``no_log`` to avoid leakage + of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - gitlab_runner - mark the ``registration_token`` parameter as ``no_log`` to + avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - hwc_ecs_instance - mark the ``admin_pass`` parameter as ``no_log`` to avoid + leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - ibm_sa_host - mark the ``iscsi_chap_secret`` parameter as ``no_log`` to avoid + leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - keycloak_* modules - mark the ``auth_client_secret`` parameter as ``no_log`` + to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - keycloak_client - mark the ``registration_access_token`` parameter as ``no_log`` + to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - librato_annotation - mark the ``api_key`` parameter as ``no_log`` to avoid + leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - logentries_msg - mark the ``token`` parameter as ``no_log`` to avoid leakage + of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - module_utils/_netapp, na_ontap_gather_facts - enabled ``no_log`` for the options + ``api_key`` and ``secret_key`` to prevent accidental disclosure (CVE-2021-20191, + https://github.com/ansible-collections/community.general/pull/1725). + - module_utils/identity/keycloak, keycloak_client, keycloak_clienttemplate, + keycloak_group - enabled ``no_log`` for the option ``auth_client_secret`` + to prevent accidental disclosure (CVE-2021-20191, https://github.com/ansible-collections/community.general/pull/1725). + - nios_nsgroup - mark the ``tsig_key`` parameter as ``no_log`` to avoid leakage + of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - oneandone_firewall_policy, oneandone_load_balancer, oneandone_monitoring_policy, + oneandone_private_network, oneandone_public_ip - mark the ``auth_token`` parameter + as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - ovirt - mark the ``instance_key`` parameter as ``no_log`` to avoid leakage + of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - ovirt - mark the ``instance_rootpw`` parameter as ``no_log`` to avoid leakage + of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - pagerduty_alert - mark the ``api_key``, ``service_key`` and ``integration_key`` + parameters as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - pagerduty_change - mark the ``integration_key`` parameter as ``no_log`` to + avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - pingdom - mark the ``key`` parameter as ``no_log`` to avoid leakage of secrets + (https://github.com/ansible-collections/community.general/pull/1736). + - pulp_repo - mark the ``feed_client_key`` parameter as ``no_log`` to avoid + leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - rax_clb_ssl - mark the ``private_key`` parameter as ``no_log`` to avoid leakage + of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - redfish_command - mark the ``update_creds.password`` parameter as ``no_log`` + to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - rollbar_deployment - mark the ``token`` parameter as ``no_log`` to avoid leakage + of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - spotinst_aws_elastigroup - mark the ``multai_token`` and ``token`` parameters + as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - stackdriver - mark the ``key`` parameter as ``no_log`` to avoid leakage of + secrets (https://github.com/ansible-collections/community.general/pull/1736). + - utm_proxy_auth_profile - enabled ``no_log`` for the option ``frontend_cookie_secret`` + to prevent accidental disclosure (CVE-2021-20191, https://github.com/ansible-collections/community.general/pull/1725). + - utm_proxy_auth_profile - mark the ``frontend_cookie_secret`` parameter as + ``no_log`` to avoid leakage of secrets. This causes the ``utm_proxy_auth_profile`` + return value to no longer containing the correct value, but a placeholder + (https://github.com/ansible-collections/community.general/pull/1736). + fragments: + - 1478-filesystem-fix-1457-resizefs-idempotency.yml + - 1691-add-name-and-id-props-to-redfish-inventory-output.yml + - 1695-parted-updatedregex.yaml + - 1703-sensu_silence-fix_json_parsing.yml + - 1724-various-fixes-for-updating-existing-gitlab-user.yml + - 2.0.1.yml + - CVE-2021-20191_no_log.yml + - dellemc-migration.yml + - no_log-fixes.yml + release_date: '2021-02-09' diff --git a/changelogs/fragments/1478-filesystem-fix-1457-resizefs-idempotency.yml b/changelogs/fragments/1478-filesystem-fix-1457-resizefs-idempotency.yml deleted file mode 100644 index a90444308e..0000000000 --- a/changelogs/fragments/1478-filesystem-fix-1457-resizefs-idempotency.yml +++ /dev/null @@ -1,5 +0,0 @@ ---- -bugfixes: - - filesystem - do not fail when ``resizefs=yes`` and ``fstype=xfs`` if there is nothing to do, even if - the filesystem is not mounted. This only covers systems supporting access to unmounted XFS filesystems. - Others will still fail (https://github.com/ansible-collections/community.general/issues/1457, https://github.com/ansible-collections/community.general/pull/1478). diff --git a/changelogs/fragments/1691-add-name-and-id-props-to-redfish-inventory-output.yml b/changelogs/fragments/1691-add-name-and-id-props-to-redfish-inventory-output.yml deleted file mode 100644 index 1cf8897018..0000000000 --- a/changelogs/fragments/1691-add-name-and-id-props-to-redfish-inventory-output.yml +++ /dev/null @@ -1,2 +0,0 @@ -bugfixes: - - redfish_info module, redfish_utils module utils - add ``Name`` and ``Id`` properties to output of Redfish inventory commands (https://github.com/ansible-collections/community.general/issues/1650). diff --git a/changelogs/fragments/1695-parted-updatedregex.yaml b/changelogs/fragments/1695-parted-updatedregex.yaml deleted file mode 100644 index fb3a5a5eaa..0000000000 --- a/changelogs/fragments/1695-parted-updatedregex.yaml +++ /dev/null @@ -1,4 +0,0 @@ -bugfixes: - - parted - change the regex that decodes the partition size to better support different formats that parted uses. - Change the regex that validates parted's version string - (https://github.com/ansible-collections/community.general/pull/1695). diff --git a/changelogs/fragments/1703-sensu_silence-fix_json_parsing.yml b/changelogs/fragments/1703-sensu_silence-fix_json_parsing.yml deleted file mode 100644 index 18d39b5674..0000000000 --- a/changelogs/fragments/1703-sensu_silence-fix_json_parsing.yml +++ /dev/null @@ -1,2 +0,0 @@ -bugfixes: - - sensu-silence module - fix json parsing of sensu API responses on Python 3.5 (https://github.com/ansible-collections/community.general/pull/1703). diff --git a/changelogs/fragments/1724-various-fixes-for-updating-existing-gitlab-user.yml b/changelogs/fragments/1724-various-fixes-for-updating-existing-gitlab-user.yml deleted file mode 100644 index eab67e0f47..0000000000 --- a/changelogs/fragments/1724-various-fixes-for-updating-existing-gitlab-user.yml +++ /dev/null @@ -1,2 +0,0 @@ -bugfixes: - - gitlab_user - make updates to the ``isadmin``, ``password`` and ``confirm`` options of an already existing GitLab user work (https://github.com/ansible-collections/community.general/pull/1724). diff --git a/changelogs/fragments/2.0.1.yml b/changelogs/fragments/2.0.1.yml deleted file mode 100644 index e1c27c139f..0000000000 --- a/changelogs/fragments/2.0.1.yml +++ /dev/null @@ -1 +0,0 @@ -release_summary: Bugfix and security bugfix (potential information leaks in multiple modules, CVE-2021-20191) release. diff --git a/changelogs/fragments/CVE-2021-20191_no_log.yml b/changelogs/fragments/CVE-2021-20191_no_log.yml deleted file mode 100644 index a2c8740598..0000000000 --- a/changelogs/fragments/CVE-2021-20191_no_log.yml +++ /dev/null @@ -1,4 +0,0 @@ -security_fixes: - - module_utils/_netapp, na_ontap_gather_facts - enabled ``no_log`` for the options ``api_key`` and ``secret_key`` to prevent accidental disclosure (CVE-2021-20191, https://github.com/ansible-collections/community.general/pull/1725). - - module_utils/identity/keycloak, keycloak_client, keycloak_clienttemplate, keycloak_group - enabled ``no_log`` for the option ``auth_client_secret`` to prevent accidental disclosure (CVE-2021-20191, https://github.com/ansible-collections/community.general/pull/1725). - - utm_proxy_auth_profile - enabled ``no_log`` for the option ``frontend_cookie_secret`` to prevent accidental disclosure (CVE-2021-20191, https://github.com/ansible-collections/community.general/pull/1725). diff --git a/changelogs/fragments/dellemc-migration.yml b/changelogs/fragments/dellemc-migration.yml deleted file mode 100644 index a04c01e3d4..0000000000 --- a/changelogs/fragments/dellemc-migration.yml +++ /dev/null @@ -1,10 +0,0 @@ -major_changes: -- | - For community.general 3.0.0, the ``ome_device_info``, ``idrac_firmware`` and ``idrac_server_config_profile`` modules will be moved to the `dellemc.openmanage `_ collection. - A redirection will be inserted so that users using ansible-base 2.10 or newer do not have to change anything. - - If you use Ansible 2.9 and explicitly use the DellEMC modules mentioned above from this collection, you will need to adjust your playbooks and roles to use FQCNs starting with ``dellemc.openmanage.`` instead of ``community.general.``, - for example replace ``community.general.ome_device_info`` in a task by ``dellemc.openmanage.ome_device_info``. - - If you use ansible-base and installed ``community.general`` manually and rely on the DellEMC modules mentioned above, you have to make sure to install the ``dellemc.openmanage`` collection as well. - If you are using FQCNs, for example ``community.general.ome_device_info`` instead of ``ome_device_info``, it will continue working, but we still recommend to adjust the FQCNs as well. diff --git a/changelogs/fragments/no_log-fixes.yml b/changelogs/fragments/no_log-fixes.yml deleted file mode 100644 index 70afd3229d..0000000000 --- a/changelogs/fragments/no_log-fixes.yml +++ /dev/null @@ -1,25 +0,0 @@ -security_fixes: - - "ovirt - mark the ``instance_rootpw`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "oneandone_firewall_policy, oneandone_load_balancer, oneandone_monitoring_policy, oneandone_private_network, oneandone_public_ip - mark the ``auth_token`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "rax_clb_ssl - mark the ``private_key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "spotinst_aws_elastigroup - mark the ``multai_token`` and ``token`` parameters as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "keycloak_client - mark the ``registration_access_token`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "librato_annotation - mark the ``api_key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "pagerduty_alert - mark the ``api_key``, ``service_key`` and ``integration_key`` parameters as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "nios_nsgroup - mark the ``tsig_key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "pulp_repo - mark the ``feed_client_key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "gitlab_runner - mark the ``registration_token`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "ibm_sa_host - mark the ``iscsi_chap_secret`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "keycloak_* modules - mark the ``auth_client_secret`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "hwc_ecs_instance - mark the ``admin_pass`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "ovirt - mark the ``instance_key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "pagerduty_change - mark the ``integration_key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "pingdom - mark the ``key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "rollbar_deployment - mark the ``token`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "stackdriver - mark the ``key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "dnsmadeeasy - mark the ``account_key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "logentries_msg - mark the ``token`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "redfish_command - mark the ``update_creds.password`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "utm_proxy_auth_profile - mark the ``frontend_cookie_secret`` parameter as ``no_log`` to avoid leakage of secrets. This causes the ``utm_proxy_auth_profile`` return value to no longer containing the correct value, but a placeholder (https://github.com/ansible-collections/community.general/pull/1736)." -breaking_changes: - - "utm_proxy_auth_profile - the ``frontend_cookie_secret`` return value now contains a placeholder string instead of the module's ``frontend_cookie_secret`` parameter (https://github.com/ansible-collections/community.general/pull/1736)." diff --git a/galaxy.yml b/galaxy.yml index 20b24b64e9..a117c9fe42 100644 --- a/galaxy.yml +++ b/galaxy.yml @@ -1,6 +1,6 @@ namespace: community name: general -version: 2.1.0 +version: 2.0.1 readme: README.md authors: - Ansible (https://github.com/ansible)