about summary refs log tree commit diff
path: root/pkgs/tools/admin/ansible
AgeCommit message (Collapse)AuthorFilesLines
2024-04-13ansible-lint: 24.2.1 -> 24.2.2R. Ryantm1-2/+2
2024-03-19Merge remote-tracking branch 'origin/master' into staging-nextMartin Weinelt3-0/+3
Conflicts: - pkgs/development/python-modules/sphinx-autobuild/default.nix
2024-03-19treewide: add meta.mainProgram to packages with a single binarystuebinm3-0/+3
The nixpkgs-unstable channel's programs.sqlite was used to identify packages producing exactly one binary, and these automatically added to their package definitions wherever possible.
2024-03-14Merge master into staging-nextgithub-actions[bot]1-2/+2
2024-03-13ansible-lint: 24.2.0 -> 24.2.1R. Ryantm1-2/+2
2024-03-12ansible-later: relax anyconfig constraintMartin Weinelt1-0/+1
2024-02-07ansible-lint: 6.22.2 -> 24.2.0R. Ryantm1-2/+2
2024-01-18ansible-lint: 6.21.1 -> 6.22.2R. Ryantm1-2/+2
2023-12-20ansible-lint: relax ruamel.yaml constraintMartin Weinelt1-0/+5
2023-10-20ansible-lint: 6.20.0 -> 6.21.1Thilo Uttendorfer1-2/+2
2023-09-19ansible-lint: 6.19.0 -> 6.20.0nyanotech1-2/+2
2023-09-12ansible-lint: 6.18.0 -> 6.19.0nyanotech1-2/+2
2023-08-28ansible-lint: 6.17.1 -> 6.18.0Wim de With1-2/+2
2023-08-22Merge pull request #250114 from tjni/ansible-laterTheodore Ni1-1/+11
ansible-later: use poetry-dynamic-versioning like upstream
2023-08-18ansible-later: use poetry-dynamic-versioning like upstreamTheodore Ni1-1/+11
2023-08-18ansible-doctor: use poetry-dynamic-versioning like upstreamTheodore Ni1-5/+11
2023-07-28ansible-later: relax dependency on PyYAMLTheodore Ni1-1/+1
2023-06-15ansible-lint: 6.17.0 -> 6.17.1Robert Sliwinski1-2/+2
2023-06-09ansible-lint: 6.16.1 -> 6.17.0Robert Sliwinski1-2/+3
2023-05-16ansible-lint: 6.16.0 -> 6.16.1Thilo Uttendorfer1-7/+2
2023-05-16ansible-later: Remove from python-modulesMartin Weinelt1-0/+77
This is an application, not a library.
2023-05-16ansible-doctor: Remove from python-modulesMartin Weinelt1-0/+61
This is an application, not a library. https://ansible-doctor.geekdocs.de/usage/getting-started/
2023-05-16ansible-lint: Remove from python-modulesMartin Weinelt1-0/+95
This is an application, not a library. https://ansible-lint.readthedocs.io/usage/
2022-04-26ansible: prune old versions; restructureMartin Weinelt1-24/+0
- Drop pkgs/tools/admin/ansible and move everything into top-level and throws into central aliases.nix - Drop the Ansible 2.8 throw - Remove Ansible 2.9/2.10, both will be EOL before the 22.05 release - Remove Ansible 2.11, it will go EOL during the 22.05 release - Expose the collections as `python3Packages.ansible` Closes: #157591
2021-11-09python3Packages.ansible-core: 2.11.6 -> 2.12.0Martin Weinelt1-3/+13
And add an override for ansible_2_11 at 2.11.6.
2021-05-23ansible: 2.10.9 -> 2.11.0Martin Weinelt1-1/+3
2021-05-13ansible_2_8: dropMartin Weinelt1-9/+1
The version went end of life on 2021/01/21.
2021-05-13ansible_2_9: 2.9.12 -> 2.9.21Martin Weinelt1-0/+1
2021-05-13ansible: 2.9.12 -> 2.10.9Martin Weinelt1-14/+1
2020-08-21ansible_2_7: dropMartin Weinelt1-10/+0
This version went EOL on 2020/06/18.
2020-08-21ansible: 2.9.12 -> 2.10.0Martin Weinelt1-2/+17
2020-08-11ansible_2_9: 2.9.11 -> 2.9.12Martin Weinelt1-2/+2
2020-07-23ansible_2_8: v2.8.12 -> v2.8.13Martin Weinelt1-2/+2
https://github.com/ansible/ansible/blob/stable-2.8/changelogs/CHANGELOG-v2.8.rst#v2-8-13
2020-05-18ansible_2_6: dropMartin Weinelt1-10/+0
Went EOL 2019/11/06. https://access.redhat.com/support/policy/updates/ansible-engine
2020-05-18ansible: default to ansible_2_9Martin Weinelt1-1/+1
Ansible 2.9 is the latest release and in full support since 2019/11/06. https://access.redhat.com/support/policy/updates/ansible-engine
2020-05-18ansible_2_7: v2.7.17 → v2.7.18Martin Weinelt1-2/+2
2020-05-18ansible_2_8: v2.8.11 → v2.8.12Martin Weinelt1-2/+2
2020-05-05ansible: v2.7.15 → v2.7.17Martin Weinelt1-2/+2
Fixes: CVE-2020-10684, CVE-2020-1733, CVE-2020-1735, CVE-2020-1739, CVE-2020-1740
2020-05-05ansible: v2.8.7 → v2.8.11Martin Weinelt1-2/+2
Fixes: CVE-2020-10684, CVE-2020-1733, CVE-2020-1735, CVE-2020-1739, CVE-2020-1740
2020-03-22ansible: Use overridePythonAttrs to get the right name attribute (#83107)Anders Kaseorg1-3/+3
Fixes #83105. Signed-off-by: Anders Kaseorg <andersk@mit.edu>
2020-01-22ansible_2_8: 2.8.6 -> 2.8.7Jonathan Ringer1-2/+2
2020-01-22ansible_2_*: overridePythonAttrs -> overrideAttrsJonathan Ringer1-2/+2
2020-01-22ansible_2_9: init at 2.9.2Jonathan Ringer1-3/+13
2019-12-15ansible_2_6: 2.6.17 -> 2.6.20Andreas Rammhold1-2/+2
This addresses the following security issues: * CVE-2019-14846 - Several Ansible plugins could disclose aws credentials in log files. inventory/aws_ec2.py, inventory/aws_rds.py, lookup/aws_account_attribute.py, and lookup/aws_secret.py, lookup/aws_ssm.py use the boto3 library from the Ansible process. The boto3 library logs credentials at log level DEBUG. If Ansible's logging was enabled (by setting LOG_PATH to a value) Ansible would set the global log level to DEBUG. This was inherited by boto and would then log boto credentials to the file specified by LOG_PATH. This did not affect aws ansible modules as those are executed in a separate process. This has been fixed by switching to log level INFO * Convert CLI provided passwords to text initially, to prevent unsafe context being lost when converting from bytes->text during post processing of PlayContext. This prevents CLI provided passwords from being incorrectly templated (CVE-2019-14856) * properly hide parameters marked with no_log in suboptions when invalid parameters are passed to the module (CVE-2019-14858) * resolves CVE-2019-10206, by avoiding templating passwords from prompt as it is probable they have special characters. * Handle improper variable substitution that was happening in safe_eval, it was always meant to just do 'type enforcement' and have Jinja2 deal with all variable interpolation. Also see CVE-2019-10156 Changelog: https://github.com/ansible/ansible/blob/9bdb89f740a87bcf760424577ce18a8f68d7a741/changelogs/CHANGELOG-v2.6.rst
2019-12-15ansible_2_7: 2.7.11 -> 2.7.15Andreas Rammhold1-2/+2
This fixes the following security issues: * Ansible: Splunk and Sumologic callback plugins leak sensitive data in logs (CVE-2019-14864) * CVE-2019-14846 - Several Ansible plugins could disclose aws credentials in log files. inventory/aws_ec2.py, inventory/aws_rds.py, lookup/aws_account_attribute.py, and lookup/aws_secret.py, lookup/aws_ssm.py use the boto3 library from the Ansible process. The boto3 library logs credentials at log level DEBUG. If Ansible's logging was enabled (by setting LOG_PATH to a value) Ansible would set the global log level to DEBUG. This was inherited by boto and would then log boto credentials to the file specified by LOG_PATH. This did not affect aws ansible modules as those are executed in a separate process. This has been fixed by switching to log level INFO * Convert CLI provided passwords to text initially, to prevent unsafe context being lost when converting from bytes->text during post processing of PlayContext. This prevents CLI provided passwords from being incorrectly templated (CVE-2019-14856) * properly hide parameters marked with no_log in suboptions when invalid parameters are passed to the module (CVE-2019-14858) * resolves CVE-2019-10206, by avoiding templating passwords from prompt as it is probable they have special characters. * Handle improper variable substitution that was happening in safe_eval, it was always meant to just do 'type enforcement' and have Jinja2 deal with all variable interpolation. Also see CVE-2019-10156 Changelog: https://github.com/ansible/ansible/blob/0623dedf2d9c4afc09e5be30d3ef249f9d1ebece/changelogs/CHANGELOG-v2.7.rst#v2-7-15
2019-06-08ansible_2_5: dropMario Rodas1-10/+0
Ansible 2.5 has reached EOL in May 21, 2019 https://access.redhat.com/support/policy/updates/ansible-engine
2019-06-08ansible_2_6: 2.6.15 -> 2.6.17Mario Rodas1-2/+2
2019-06-08ansible_2_7: 2.7.10 -> 2.7.11Mario Rodas1-2/+2
2019-06-08ansible: 2.7.6 -> 2.8.1Giacomo Longo1-1/+11
2019-04-13ansible_2_6: 2.6.9 -> 2.6.15 (#58286)Aaron Bull Schaefer1-2/+2