Skip to content

Latest commit

 

History

History
107 lines (68 loc) · 3 KB

CHANGELOG.rst

File metadata and controls

107 lines (68 loc) · 3 KB

Community Sops Release Notes

This is a security release, fixing a potential information leak in the sops_encrypt module.

  • sops_encrypt - mark the aws_secret_access_key and aws_session_token parameters as no_log to avoid leakage of secrets (ansible-collections#54).

This release include some fixes to Ansible docs and required changes for inclusion in Ansible.

Fix of 1.0.1 release which had no changelog entry.

Re-release of 1.0.0 to counteract error during release.

First stable release. This release is expected to be included in Ansible 3.0.0.

  • All plugins and modules: allow to pass generic sops options with new options config_path, enable_local_keyservice, keyservice. Also allow to pass AWS parameters with options aws_profile, aws_access_key_id, aws_secret_access_key, and aws_session_token (ansible-collections#47).
  • sops_encrypt - allow to pass encryption-specific options kms, gcp_kms, azure_kv, hc_vault_transit, pgp, unencrypted_suffix, encrypted_suffix, unencrypted_regex, encrypted_regex, encryption_context, and shamir_secret_sharing_threshold to sops (ansible-collections#47).

This release adds features for the lookup and vars plugins.

  • sops lookup plugin - add empty_on_not_exist option which allows to return an empty string instead of an error when the file does not exist (ansible-collections#33).
  • sops vars plugin - add option to control caching (ansible-collections#32).
  • sops vars plugin - add option to determine when vars are loaded (ansible-collections#32).

First release of the community.sops collection! This release includes multiple plugins: an action plugin, a lookup plugin and a vars plugin.

  • sops - Read sops encrypted file contents
  • sops - Loading sops-encrypted vars files
  • load_vars - Load sops-encrypted variables from files, dynamically within a task
  • sops_encrypt - Encrypt data with sops