Commit Graph

78 Commits

Author SHA1 Message Date
R. Ryantm
76bf98fc84 ansible-lint: 24.2.1 -> 24.2.2 2024-04-13 05:48:47 +00:00
Martin Weinelt
3321e63b12
Merge remote-tracking branch 'origin/master' into staging-next
Conflicts:
- pkgs/development/python-modules/sphinx-autobuild/default.nix
2024-03-19 04:00:32 +01:00
stuebinm
ff1a94e523 treewide: add meta.mainProgram to packages with a single binary
The nixpkgs-unstable channel's programs.sqlite was used to identify
packages producing exactly one binary, and these automatically added
to their package definitions wherever possible.
2024-03-19 03:14:51 +01:00
github-actions[bot]
cc92370007
Merge master into staging-next 2024-03-14 00:02:16 +00:00
R. Ryantm
ba0b2437ae ansible-lint: 24.2.0 -> 24.2.1 2024-03-13 20:30:29 +01:00
Martin Weinelt
7e75fc3cd6 ansible-later: relax anyconfig constraint 2024-03-12 18:25:15 +01:00
R. Ryantm
f4bda16a49 ansible-lint: 6.22.2 -> 24.2.0 2024-02-07 21:57:17 +00:00
R. Ryantm
3ce1d2203d ansible-lint: 6.21.1 -> 6.22.2 2024-01-18 21:27:39 +00:00
Martin Weinelt
d9796778fb
ansible-lint: relax ruamel.yaml constraint 2023-12-20 20:46:36 +01:00
Thilo Uttendorfer
3ce0f400ca
ansible-lint: 6.20.0 -> 6.21.1 2023-10-20 08:51:58 +02:00
nyanotech
2a7bd72b8c
ansible-lint: 6.19.0 -> 6.20.0 2023-09-19 14:51:58 -07:00
nyanotech
003682eac6
ansible-lint: 6.18.0 -> 6.19.0 2023-09-12 20:21:02 -07:00
Wim de With
1246976a33 ansible-lint: 6.17.1 -> 6.18.0 2023-08-28 20:22:59 +02:00
Theodore Ni
89987539b8
Merge pull request #250114 from tjni/ansible-later
ansible-later: use poetry-dynamic-versioning like upstream
2023-08-22 10:50:21 -07:00
Theodore Ni
b593190dbf
ansible-later: use poetry-dynamic-versioning like upstream 2023-08-18 23:11:56 -07:00
Theodore Ni
42fa97340b
ansible-doctor: use poetry-dynamic-versioning like upstream 2023-08-18 22:59:15 -07:00
Theodore Ni
f3503c5e4e ansible-later: relax dependency on PyYAML 2023-07-28 12:15:32 +02:00
Robert Sliwinski
b09cf37c72 ansible-lint: 6.17.0 -> 6.17.1 2023-06-15 10:56:31 +02:00
Robert Sliwinski
c943a4a505 ansible-lint: 6.16.1 -> 6.17.0 2023-06-09 15:12:42 +02:00
Thilo Uttendorfer
11f614eb13
ansible-lint: 6.16.0 -> 6.16.1 2023-05-16 22:19:45 +02:00
Martin Weinelt
fab6fc3532
ansible-later: Remove from python-modules
This is an application, not a library.
2023-05-16 09:48:23 +02:00
Martin Weinelt
23b2891f60
ansible-doctor: Remove from python-modules
This is an application, not a library.

https://ansible-doctor.geekdocs.de/usage/getting-started/
2023-05-16 01:20:14 +02:00
Martin Weinelt
4a98f3a900
ansible-lint: Remove from python-modules
This is an application, not a library.

https://ansible-lint.readthedocs.io/usage/
2023-05-16 01:20:12 +02:00
Martin Weinelt
0f946e2875
ansible: prune old versions; restructure
- Drop pkgs/tools/admin/ansible and move everything into top-level and
  throws into central aliases.nix
- Drop the Ansible 2.8 throw
- Remove Ansible 2.9/2.10, both will be EOL before the 22.05 release
- Remove Ansible 2.11, it will go EOL during the 22.05 release
- Expose the collections as `python3Packages.ansible`

Closes: #157591
2022-04-26 11:12:09 +02:00
Martin Weinelt
ab8c049e63
python3Packages.ansible-core: 2.11.6 -> 2.12.0
And add an override for ansible_2_11 at 2.11.6.
2021-11-09 12:30:26 +01:00
Martin Weinelt
400d5d938c
ansible: 2.10.9 -> 2.11.0 2021-05-23 18:37:52 +02:00
Martin Weinelt
79b32cae23 ansible_2_8: drop
The version went end of life on 2021/01/21.
2021-05-13 15:38:56 -07:00
Martin Weinelt
7bd5cb5fb2 ansible_2_9: 2.9.12 -> 2.9.21 2021-05-13 15:38:56 -07:00
Martin Weinelt
5281ae97c2 ansible: 2.9.12 -> 2.10.9 2021-05-13 15:38:56 -07:00
Martin Weinelt
0d131f81eb ansible_2_7: drop
This version went EOL on 2020/06/18.
2020-08-21 10:44:50 -07:00
Martin Weinelt
38b7da9144 ansible: 2.9.12 -> 2.10.0 2020-08-21 10:44:50 -07:00
Martin Weinelt
a75097d2c1 ansible_2_9: 2.9.11 -> 2.9.12 2020-08-11 10:12:29 -07:00
Martin Weinelt
0a3e4d9ff0 ansible_2_8: v2.8.12 -> v2.8.13
https://github.com/ansible/ansible/blob/stable-2.8/changelogs/CHANGELOG-v2.8.rst#v2-8-13
2020-07-23 09:29:40 +02:00
Martin Weinelt
410fdbada3
ansible_2_6: drop
Went EOL 2019/11/06.
https://access.redhat.com/support/policy/updates/ansible-engine
2020-05-18 01:45:30 +02:00
Martin Weinelt
cabcd8be10
ansible: default to ansible_2_9
Ansible 2.9 is the latest release and in full support since 2019/11/06.
https://access.redhat.com/support/policy/updates/ansible-engine
2020-05-18 01:45:21 +02:00
Martin Weinelt
25233a5db7
ansible_2_7: v2.7.17 → v2.7.18 2020-05-18 01:27:40 +02:00
Martin Weinelt
c0e6848ad7
ansible_2_8: v2.8.11 → v2.8.12 2020-05-18 01:25:58 +02:00
Martin Weinelt
e829499d69
ansible: v2.7.15 → v2.7.17
Fixes: CVE-2020-10684, CVE-2020-1733, CVE-2020-1735, CVE-2020-1739, CVE-2020-1740
2020-05-05 21:28:20 +02:00
Martin Weinelt
1c181e1bba
ansible: v2.8.7 → v2.8.11
Fixes: CVE-2020-10684, CVE-2020-1733, CVE-2020-1735, CVE-2020-1739, CVE-2020-1740
2020-05-05 21:28:12 +02:00
Anders Kaseorg
1134b0bc6e
ansible: Use overridePythonAttrs to get the right name attribute (#83107)
Fixes #83105.

Signed-off-by: Anders Kaseorg <andersk@mit.edu>
2020-03-22 03:09:42 -04:00
Jonathan Ringer
1474940ea4 ansible_2_8: 2.8.6 -> 2.8.7 2020-01-22 01:12:28 -08:00
Jonathan Ringer
3444d76c1b ansible_2_*: overridePythonAttrs -> overrideAttrs 2020-01-22 01:12:28 -08:00
Jonathan Ringer
99eb9231d4 ansible_2_9: init at 2.9.2 2020-01-22 01:12:28 -08:00
Andreas Rammhold
b21b92947e ansible_2_6: 2.6.17 -> 2.6.20
This addresses the following security issues:

  * CVE-2019-14846 - Several Ansible plugins could disclose aws
    credentials in log files. inventory/aws_ec2.py, inventory/aws_rds.py,
    lookup/aws_account_attribute.py, and lookup/aws_secret.py,
    lookup/aws_ssm.py use the boto3 library from the Ansible process. The
    boto3 library logs credentials at log level DEBUG. If Ansible's
    logging was enabled (by setting LOG_PATH to a value) Ansible would set
    the global log level to DEBUG. This was inherited by boto and would
    then log boto credentials to the file specified by LOG_PATH. This did
    not affect aws ansible modules as those are executed in a separate
    process. This has been fixed by switching to log level INFO
  * Convert CLI provided passwords to text initially, to prevent unsafe
    context being lost when converting from bytes->text during post
    processing of PlayContext. This prevents CLI provided passwords from
    being incorrectly templated (CVE-2019-14856)
  * properly hide parameters marked with no_log in suboptions when
    invalid parameters are passed to the module (CVE-2019-14858)
  * resolves CVE-2019-10206, by avoiding templating passwords from
    prompt as it is probable they have special characters.
  * Handle improper variable substitution that was happening in
    safe_eval, it was always meant to just do 'type enforcement' and have
    Jinja2 deal with all variable interpolation. Also see CVE-2019-10156

Changelog: 9bdb89f740/changelogs/CHANGELOG-v2.6.rst
2019-12-15 21:25:07 +01:00
Andreas Rammhold
64e2791092 ansible_2_7: 2.7.11 -> 2.7.15
This fixes the following security issues:
  * Ansible: Splunk and Sumologic callback plugins leak sensitive data
    in logs (CVE-2019-14864)
  * CVE-2019-14846 - Several Ansible plugins could disclose aws
    credentials in log files. inventory/aws_ec2.py, inventory/aws_rds.py,
    lookup/aws_account_attribute.py, and lookup/aws_secret.py,
    lookup/aws_ssm.py use the boto3 library from the Ansible process. The
    boto3 library logs credentials at log level DEBUG. If Ansible's
    logging was enabled (by setting LOG_PATH to a value) Ansible would set
    the global log level to DEBUG. This was inherited by boto and would
    then log boto credentials to the file specified by LOG_PATH. This did
    not affect aws ansible modules as those are executed in a separate
    process. This has been fixed by switching to log level INFO
  * Convert CLI provided passwords to text initially, to prevent unsafe
    context being lost when converting from bytes->text during post
    processing of PlayContext. This prevents CLI provided passwords from
    being incorrectly templated (CVE-2019-14856)
  * properly hide parameters marked with no_log in suboptions when invalid
    parameters are passed to the module (CVE-2019-14858)
  * resolves CVE-2019-10206, by avoiding templating passwords from
    prompt as it is probable they have special characters.
  * Handle improper variable substitution that was happening in
    safe_eval, it was always meant to just do 'type enforcement' and have
    Jinja2 deal with all variable interpolation. Also see CVE-2019-10156

Changelog: 0623dedf2d/changelogs/CHANGELOG-v2.7.rst (v2-7-15)
2019-12-15 21:24:59 +01:00
Mario Rodas
30f2074503
ansible_2_5: drop
Ansible 2.5 has reached EOL in May 21, 2019
https://access.redhat.com/support/policy/updates/ansible-engine
2019-06-08 21:05:24 -05:00
Mario Rodas
e38bbb01eb
ansible_2_6: 2.6.15 -> 2.6.17 2019-06-08 21:05:24 -05:00
Mario Rodas
69a45144d5
ansible_2_7: 2.7.10 -> 2.7.11 2019-06-08 21:05:24 -05:00
Giacomo Longo
646ed20652
ansible: 2.7.6 -> 2.8.1 2019-06-08 21:05:24 -05:00
Aaron Bull Schaefer
290be50d1e ansible_2_6: 2.6.9 -> 2.6.15 (#58286) 2019-04-13 21:35:28 +02:00