From b81ba747baf8b2361070d9877eb14011130339bc Mon Sep 17 00:00:00 2001 From: Felix Fontein Date: Tue, 9 Feb 2021 13:09:36 +0100 Subject: [PATCH] Release 1.3.6. --- CHANGELOG.rst | 58 ++++++++++ changelogs/changelog.yaml | 100 ++++++++++++++++++ changelogs/fragments/1.3.6.yml | 1 - ...lesystem-fix-1457-resizefs-idempotency.yml | 5 - .../fragments/1690-scaleway-regions.yaml | 2 - ...d-id-props-to-redfish-inventory-output.yml | 2 - .../fragments/1695-parted-updatedregex.yaml | 4 - .../1703-sensu_silence-fix_json_parsing.yml | 2 - ...ixes-for-updating-existing-gitlab-user.yml | 2 - .../fragments/CVE-2021-20191_no_log.yml | 4 - .../CVE-2021-20191_no_log_docker.yml | 2 - ...76-leading-v-support-in-docker-version.yml | 2 - changelogs/fragments/no_log-fixes.yml | 25 ----- 13 files changed, 158 insertions(+), 51 deletions(-) delete mode 100644 changelogs/fragments/1.3.6.yml delete mode 100644 changelogs/fragments/1478-filesystem-fix-1457-resizefs-idempotency.yml delete mode 100644 changelogs/fragments/1690-scaleway-regions.yaml delete mode 100644 changelogs/fragments/1691-add-name-and-id-props-to-redfish-inventory-output.yml delete mode 100644 changelogs/fragments/1695-parted-updatedregex.yaml delete mode 100644 changelogs/fragments/1703-sensu_silence-fix_json_parsing.yml delete mode 100644 changelogs/fragments/1724-various-fixes-for-updating-existing-gitlab-user.yml delete mode 100644 changelogs/fragments/CVE-2021-20191_no_log.yml delete mode 100644 changelogs/fragments/CVE-2021-20191_no_log_docker.yml delete mode 100644 changelogs/fragments/community.docker-76-leading-v-support-in-docker-version.yml delete mode 100644 changelogs/fragments/no_log-fixes.yml diff --git a/CHANGELOG.rst b/CHANGELOG.rst index e5462f4172..639cf881cd 100644 --- a/CHANGELOG.rst +++ b/CHANGELOG.rst @@ -5,6 +5,64 @@ Community General Release Notes .. contents:: Topics +v1.3.6 +====== + +Release Summary +--------------- + +Regular bugfix and security bugfix (potential information leaks in multiple modules, CVE-2021-20191) release. + +Minor Changes +------------- + +- scaleway modules and inventory plugin - update regions and zones to add the new ones (https://github.com/ansible-collections/community.general/pull/1690). + +Breaking Changes / Porting Guide +-------------------------------- + +- utm_proxy_auth_profile - the ``frontend_cookie_secret`` return value now contains a placeholder string instead of the module's ``frontend_cookie_secret`` parameter (https://github.com/ansible-collections/community.general/pull/1736). + +Security Fixes +-------------- + +- dnsmadeeasy - mark the ``account_key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- docker_swarm - enabled ``no_log`` for the option ``signing_ca_key`` to prevent accidental disclosure (CVE-2021-20191, https://github.com/ansible-collections/community.general/pull/1728). +- gitlab_runner - mark the ``registration_token`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- hwc_ecs_instance - mark the ``admin_pass`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- ibm_sa_host - mark the ``iscsi_chap_secret`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- keycloak_* modules - mark the ``auth_client_secret`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- keycloak_client - mark the ``registration_access_token`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- librato_annotation - mark the ``api_key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- logentries_msg - mark the ``token`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- module_utils/_netapp, na_ontap_gather_facts - enabled ``no_log`` for the options ``api_key`` and ``secret_key`` to prevent accidental disclosure (CVE-2021-20191, https://github.com/ansible-collections/community.general/pull/1725). +- module_utils/identity/keycloak, keycloak_client, keycloak_clienttemplate, keycloak_group - enabled ``no_log`` for the option ``auth_client_secret`` to prevent accidental disclosure (CVE-2021-20191, https://github.com/ansible-collections/community.general/pull/1725). +- nios_nsgroup - mark the ``tsig_key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- oneandone_firewall_policy, oneandone_load_balancer, oneandone_monitoring_policy, oneandone_private_network, oneandone_public_ip - mark the ``auth_token`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- ovirt - mark the ``instance_key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- ovirt - mark the ``instance_rootpw`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- pagerduty_alert - mark the ``api_key``, ``service_key`` and ``integration_key`` parameters as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- pagerduty_change - mark the ``integration_key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- pingdom - mark the ``key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- pulp_repo - mark the ``feed_client_key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- rax_clb_ssl - mark the ``private_key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- redfish_command - mark the ``update_creds.password`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- rollbar_deployment - mark the ``token`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- spotinst_aws_elastigroup - mark the ``multai_token`` and ``token`` parameters as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- stackdriver - mark the ``key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). +- utm_proxy_auth_profile - enabled ``no_log`` for the option ``frontend_cookie_secret`` to prevent accidental disclosure (CVE-2021-20191, https://github.com/ansible-collections/community.general/pull/1725). +- utm_proxy_auth_profile - mark the ``frontend_cookie_secret`` parameter as ``no_log`` to avoid leakage of secrets. This causes the ``utm_proxy_auth_profile`` return value to no longer containing the correct value, but a placeholder (https://github.com/ansible-collections/community.general/pull/1736). + +Bugfixes +-------- + +- docker connection plugin - fix Docker version parsing, as some docker versions have a leading ``v`` in the output of the command ``docker version --format "{{.Server.Version}}"`` (https://github.com/ansible-collections/community.docker/pull/76). +- filesystem - do not fail when ``resizefs=yes`` and ``fstype=xfs`` if there is nothing to do, even if the filesystem is not mounted. This only covers systems supporting access to unmounted XFS filesystems. Others will still fail (https://github.com/ansible-collections/community.general/issues/1457, https://github.com/ansible-collections/community.general/pull/1478). +- gitlab_user - make updates to the ``isadmin``, ``password`` and ``confirm`` options of an already existing GitLab user work (https://github.com/ansible-collections/community.general/pull/1724). +- parted - change the regex that decodes the partition size to better support different formats that parted uses. Change the regex that validates parted's version string (https://github.com/ansible-collections/community.general/pull/1695). +- redfish_info module, redfish_utils module utils - add ``Name`` and ``Id`` properties to output of Redfish inventory commands (https://github.com/ansible-collections/community.general/issues/1650). +- sensu-silence module - fix json parsing of sensu API responses on Python 3.5 (https://github.com/ansible-collections/community.general/pull/1703). + v1.3.5 ====== diff --git a/changelogs/changelog.yaml b/changelogs/changelog.yaml index 8cb857a7c2..ff11138fab 100644 --- a/changelogs/changelog.yaml +++ b/changelogs/changelog.yaml @@ -1850,3 +1850,103 @@ releases: - community.docker-73-docker_image-fix-old-docker-py-version.yml - lldp-use-get_bin_path-to-locate-the-lldpctl-executable.yaml release_date: '2021-01-26' + 1.3.6: + changes: + breaking_changes: + - utm_proxy_auth_profile - the ``frontend_cookie_secret`` return value now contains + a placeholder string instead of the module's ``frontend_cookie_secret`` parameter + (https://github.com/ansible-collections/community.general/pull/1736). + bugfixes: + - docker connection plugin - fix Docker version parsing, as some docker versions + have a leading ``v`` in the output of the command ``docker version --format + "{{.Server.Version}}"`` (https://github.com/ansible-collections/community.docker/pull/76). + - filesystem - do not fail when ``resizefs=yes`` and ``fstype=xfs`` if there + is nothing to do, even if the filesystem is not mounted. This only covers + systems supporting access to unmounted XFS filesystems. Others will still + fail (https://github.com/ansible-collections/community.general/issues/1457, + https://github.com/ansible-collections/community.general/pull/1478). + - gitlab_user - make updates to the ``isadmin``, ``password`` and ``confirm`` + options of an already existing GitLab user work (https://github.com/ansible-collections/community.general/pull/1724). + - parted - change the regex that decodes the partition size to better support + different formats that parted uses. Change the regex that validates parted's + version string (https://github.com/ansible-collections/community.general/pull/1695). + - redfish_info module, redfish_utils module utils - add ``Name`` and ``Id`` + properties to output of Redfish inventory commands (https://github.com/ansible-collections/community.general/issues/1650). + - sensu-silence module - fix json parsing of sensu API responses on Python 3.5 + (https://github.com/ansible-collections/community.general/pull/1703). + minor_changes: + - scaleway modules and inventory plugin - update regions and zones to add the + new ones (https://github.com/ansible-collections/community.general/pull/1690). + release_summary: Regular bugfix and security bugfix (potential information leaks + in multiple modules, CVE-2021-20191) release. + security_fixes: + - dnsmadeeasy - mark the ``account_key`` parameter as ``no_log`` to avoid leakage + of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - docker_swarm - enabled ``no_log`` for the option ``signing_ca_key`` to prevent + accidental disclosure (CVE-2021-20191, https://github.com/ansible-collections/community.general/pull/1728). + - gitlab_runner - mark the ``registration_token`` parameter as ``no_log`` to + avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - hwc_ecs_instance - mark the ``admin_pass`` parameter as ``no_log`` to avoid + leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - ibm_sa_host - mark the ``iscsi_chap_secret`` parameter as ``no_log`` to avoid + leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - keycloak_* modules - mark the ``auth_client_secret`` parameter as ``no_log`` + to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - keycloak_client - mark the ``registration_access_token`` parameter as ``no_log`` + to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - librato_annotation - mark the ``api_key`` parameter as ``no_log`` to avoid + leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - logentries_msg - mark the ``token`` parameter as ``no_log`` to avoid leakage + of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - module_utils/_netapp, na_ontap_gather_facts - enabled ``no_log`` for the options + ``api_key`` and ``secret_key`` to prevent accidental disclosure (CVE-2021-20191, + https://github.com/ansible-collections/community.general/pull/1725). + - module_utils/identity/keycloak, keycloak_client, keycloak_clienttemplate, + keycloak_group - enabled ``no_log`` for the option ``auth_client_secret`` + to prevent accidental disclosure (CVE-2021-20191, https://github.com/ansible-collections/community.general/pull/1725). + - nios_nsgroup - mark the ``tsig_key`` parameter as ``no_log`` to avoid leakage + of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - oneandone_firewall_policy, oneandone_load_balancer, oneandone_monitoring_policy, + oneandone_private_network, oneandone_public_ip - mark the ``auth_token`` parameter + as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - ovirt - mark the ``instance_key`` parameter as ``no_log`` to avoid leakage + of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - ovirt - mark the ``instance_rootpw`` parameter as ``no_log`` to avoid leakage + of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - pagerduty_alert - mark the ``api_key``, ``service_key`` and ``integration_key`` + parameters as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - pagerduty_change - mark the ``integration_key`` parameter as ``no_log`` to + avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - pingdom - mark the ``key`` parameter as ``no_log`` to avoid leakage of secrets + (https://github.com/ansible-collections/community.general/pull/1736). + - pulp_repo - mark the ``feed_client_key`` parameter as ``no_log`` to avoid + leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - rax_clb_ssl - mark the ``private_key`` parameter as ``no_log`` to avoid leakage + of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - redfish_command - mark the ``update_creds.password`` parameter as ``no_log`` + to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - rollbar_deployment - mark the ``token`` parameter as ``no_log`` to avoid leakage + of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - spotinst_aws_elastigroup - mark the ``multai_token`` and ``token`` parameters + as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736). + - stackdriver - mark the ``key`` parameter as ``no_log`` to avoid leakage of + secrets (https://github.com/ansible-collections/community.general/pull/1736). + - utm_proxy_auth_profile - enabled ``no_log`` for the option ``frontend_cookie_secret`` + to prevent accidental disclosure (CVE-2021-20191, https://github.com/ansible-collections/community.general/pull/1725). + - utm_proxy_auth_profile - mark the ``frontend_cookie_secret`` parameter as + ``no_log`` to avoid leakage of secrets. This causes the ``utm_proxy_auth_profile`` + return value to no longer containing the correct value, but a placeholder + (https://github.com/ansible-collections/community.general/pull/1736). + fragments: + - 1.3.6.yml + - 1478-filesystem-fix-1457-resizefs-idempotency.yml + - 1690-scaleway-regions.yaml + - 1691-add-name-and-id-props-to-redfish-inventory-output.yml + - 1695-parted-updatedregex.yaml + - 1703-sensu_silence-fix_json_parsing.yml + - 1724-various-fixes-for-updating-existing-gitlab-user.yml + - CVE-2021-20191_no_log.yml + - CVE-2021-20191_no_log_docker.yml + - community.docker-76-leading-v-support-in-docker-version.yml + - no_log-fixes.yml + release_date: '2021-02-09' diff --git a/changelogs/fragments/1.3.6.yml b/changelogs/fragments/1.3.6.yml deleted file mode 100644 index 114e7217e6..0000000000 --- a/changelogs/fragments/1.3.6.yml +++ /dev/null @@ -1 +0,0 @@ -release_summary: Regular bugfix and security bugfix (potential information leaks in multiple modules, CVE-2021-20191) release. diff --git a/changelogs/fragments/1478-filesystem-fix-1457-resizefs-idempotency.yml b/changelogs/fragments/1478-filesystem-fix-1457-resizefs-idempotency.yml deleted file mode 100644 index a90444308e..0000000000 --- a/changelogs/fragments/1478-filesystem-fix-1457-resizefs-idempotency.yml +++ /dev/null @@ -1,5 +0,0 @@ ---- -bugfixes: - - filesystem - do not fail when ``resizefs=yes`` and ``fstype=xfs`` if there is nothing to do, even if - the filesystem is not mounted. This only covers systems supporting access to unmounted XFS filesystems. - Others will still fail (https://github.com/ansible-collections/community.general/issues/1457, https://github.com/ansible-collections/community.general/pull/1478). diff --git a/changelogs/fragments/1690-scaleway-regions.yaml b/changelogs/fragments/1690-scaleway-regions.yaml deleted file mode 100644 index 6788246f7d..0000000000 --- a/changelogs/fragments/1690-scaleway-regions.yaml +++ /dev/null @@ -1,2 +0,0 @@ -minor_changes: - - scaleway modules and inventory plugin - update regions and zones to add the new ones (https://github.com/ansible-collections/community.general/pull/1690). diff --git a/changelogs/fragments/1691-add-name-and-id-props-to-redfish-inventory-output.yml b/changelogs/fragments/1691-add-name-and-id-props-to-redfish-inventory-output.yml deleted file mode 100644 index 1cf8897018..0000000000 --- a/changelogs/fragments/1691-add-name-and-id-props-to-redfish-inventory-output.yml +++ /dev/null @@ -1,2 +0,0 @@ -bugfixes: - - redfish_info module, redfish_utils module utils - add ``Name`` and ``Id`` properties to output of Redfish inventory commands (https://github.com/ansible-collections/community.general/issues/1650). diff --git a/changelogs/fragments/1695-parted-updatedregex.yaml b/changelogs/fragments/1695-parted-updatedregex.yaml deleted file mode 100644 index fb3a5a5eaa..0000000000 --- a/changelogs/fragments/1695-parted-updatedregex.yaml +++ /dev/null @@ -1,4 +0,0 @@ -bugfixes: - - parted - change the regex that decodes the partition size to better support different formats that parted uses. - Change the regex that validates parted's version string - (https://github.com/ansible-collections/community.general/pull/1695). diff --git a/changelogs/fragments/1703-sensu_silence-fix_json_parsing.yml b/changelogs/fragments/1703-sensu_silence-fix_json_parsing.yml deleted file mode 100644 index 18d39b5674..0000000000 --- a/changelogs/fragments/1703-sensu_silence-fix_json_parsing.yml +++ /dev/null @@ -1,2 +0,0 @@ -bugfixes: - - sensu-silence module - fix json parsing of sensu API responses on Python 3.5 (https://github.com/ansible-collections/community.general/pull/1703). diff --git a/changelogs/fragments/1724-various-fixes-for-updating-existing-gitlab-user.yml b/changelogs/fragments/1724-various-fixes-for-updating-existing-gitlab-user.yml deleted file mode 100644 index eab67e0f47..0000000000 --- a/changelogs/fragments/1724-various-fixes-for-updating-existing-gitlab-user.yml +++ /dev/null @@ -1,2 +0,0 @@ -bugfixes: - - gitlab_user - make updates to the ``isadmin``, ``password`` and ``confirm`` options of an already existing GitLab user work (https://github.com/ansible-collections/community.general/pull/1724). diff --git a/changelogs/fragments/CVE-2021-20191_no_log.yml b/changelogs/fragments/CVE-2021-20191_no_log.yml deleted file mode 100644 index a2c8740598..0000000000 --- a/changelogs/fragments/CVE-2021-20191_no_log.yml +++ /dev/null @@ -1,4 +0,0 @@ -security_fixes: - - module_utils/_netapp, na_ontap_gather_facts - enabled ``no_log`` for the options ``api_key`` and ``secret_key`` to prevent accidental disclosure (CVE-2021-20191, https://github.com/ansible-collections/community.general/pull/1725). - - module_utils/identity/keycloak, keycloak_client, keycloak_clienttemplate, keycloak_group - enabled ``no_log`` for the option ``auth_client_secret`` to prevent accidental disclosure (CVE-2021-20191, https://github.com/ansible-collections/community.general/pull/1725). - - utm_proxy_auth_profile - enabled ``no_log`` for the option ``frontend_cookie_secret`` to prevent accidental disclosure (CVE-2021-20191, https://github.com/ansible-collections/community.general/pull/1725). diff --git a/changelogs/fragments/CVE-2021-20191_no_log_docker.yml b/changelogs/fragments/CVE-2021-20191_no_log_docker.yml deleted file mode 100644 index a5218324e3..0000000000 --- a/changelogs/fragments/CVE-2021-20191_no_log_docker.yml +++ /dev/null @@ -1,2 +0,0 @@ -security_fixes: - - docker_swarm - enabled ``no_log`` for the option ``signing_ca_key`` to prevent accidental disclosure (CVE-2021-20191, https://github.com/ansible-collections/community.general/pull/1728). diff --git a/changelogs/fragments/community.docker-76-leading-v-support-in-docker-version.yml b/changelogs/fragments/community.docker-76-leading-v-support-in-docker-version.yml deleted file mode 100644 index 5ac004d3c5..0000000000 --- a/changelogs/fragments/community.docker-76-leading-v-support-in-docker-version.yml +++ /dev/null @@ -1,2 +0,0 @@ -bugfixes: - - docker connection plugin - fix Docker version parsing, as some docker versions have a leading ``v`` in the output of the command ``docker version --format "{{.Server.Version}}"`` (https://github.com/ansible-collections/community.docker/pull/76). diff --git a/changelogs/fragments/no_log-fixes.yml b/changelogs/fragments/no_log-fixes.yml deleted file mode 100644 index 70afd3229d..0000000000 --- a/changelogs/fragments/no_log-fixes.yml +++ /dev/null @@ -1,25 +0,0 @@ -security_fixes: - - "ovirt - mark the ``instance_rootpw`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "oneandone_firewall_policy, oneandone_load_balancer, oneandone_monitoring_policy, oneandone_private_network, oneandone_public_ip - mark the ``auth_token`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "rax_clb_ssl - mark the ``private_key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "spotinst_aws_elastigroup - mark the ``multai_token`` and ``token`` parameters as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "keycloak_client - mark the ``registration_access_token`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "librato_annotation - mark the ``api_key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "pagerduty_alert - mark the ``api_key``, ``service_key`` and ``integration_key`` parameters as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "nios_nsgroup - mark the ``tsig_key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "pulp_repo - mark the ``feed_client_key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "gitlab_runner - mark the ``registration_token`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "ibm_sa_host - mark the ``iscsi_chap_secret`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "keycloak_* modules - mark the ``auth_client_secret`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "hwc_ecs_instance - mark the ``admin_pass`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "ovirt - mark the ``instance_key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "pagerduty_change - mark the ``integration_key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "pingdom - mark the ``key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "rollbar_deployment - mark the ``token`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "stackdriver - mark the ``key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "dnsmadeeasy - mark the ``account_key`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "logentries_msg - mark the ``token`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "redfish_command - mark the ``update_creds.password`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/1736)." - - "utm_proxy_auth_profile - mark the ``frontend_cookie_secret`` parameter as ``no_log`` to avoid leakage of secrets. This causes the ``utm_proxy_auth_profile`` return value to no longer containing the correct value, but a placeholder (https://github.com/ansible-collections/community.general/pull/1736)." -breaking_changes: - - "utm_proxy_auth_profile - the ``frontend_cookie_secret`` return value now contains a placeholder string instead of the module's ``frontend_cookie_secret`` parameter (https://github.com/ansible-collections/community.general/pull/1736)."