Update dependency community.crypto to v1.8.0 #11
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
1.4.0
->1.8.0
Release Notes
ansible-collections/community.crypto
v1.8.0
Compare Source
======
Release Summary
Regular bugfix and feature release.
Minor Changes
regenerate
option to validate additional certificate parameters which trigger regeneration of an existing certificate (openssh_cert - Adding regenerate option ansible-collections/community.crypto#256).diff
support (openssh_cert - cleanup and diff support ansible-collections/community.crypto#255).Bugfixes
v1.7.1
Compare Source
======
Release Summary
Bugfix release.
Bugfixes
cryptography
backend (PKCS#12 operations fail with "TypeError: password must be bytes-like" on the cryptography backend ansible-collections/community.crypto#247, Fix openssl_pkcs12 crash with cryptography backend when loading passphrase-protected files ansible-collections/community.crypto#248).v1.7.0
Compare Source
======
Release Summary
Regular feature and bugfix release.
Minor Changes
backend
parameter for selecting between the cryptography library or the OpenSSH binary for the execution of actions performed byopenssh_keypair
(openssh_keypair - Adding backend option and refactoring backend code ansible-collections/community.crypto#236).passphrase
parameter for encrypting/decrypting OpenSSH private keys (openssh_keypair: Adding passphrase parameter ansible-collections/community.crypto#225).public_key_type
andpublic_key_data
(openssl_csr_info and x509_certificate_info: return more public key information ansible-collections/community.crypto#233).select_crypto_backend
and acryptography
backend. This requires cryptography 3.0 or newer, and does not support theiter_size
andmaciter_size
options (openssl_pkcs12: add cryptography backend ansible-collections/community.crypto#234).public_key_type
andpublic_key_data
(openssl_csr_info and x509_certificate_info: return more public key information ansible-collections/community.crypto#233).list_revoked_certificates
option to avoid enumerating all revoked certificates (x509_crl_info: allow to not enumerate revoked certificates ansible-collections/community.crypto#232).Bugfixes
check_mode
to populate return values for existing keypairs (openssh_keypair: check_mode should return public key ansible-collections/community.crypto#113, openssh_keypair: Populate return values when keypair exists and check_mode=true ansible-collections/community.crypto#230).assertonly
provider is used and some error conditions should be reported (Exception when certificate does not belong to the specified private key ansible-collections/community.crypto#240, Fix crash in x509_certificate ansible-collections/community.crypto#241).New Modules
v1.6.2
Compare Source
======
Release Summary
Bugfix release. Fixes compatibility issue of ACME modules with step-ca.
Bugfixes
meta
directory key is not present (The ACME modules does not seem to support ACME directories that do not contain a "meta" key in their directory response, resulting in module crash ansible-collections/community.crypto#220, acme_* modules: make sure 'meta' is always in directory ansible-collections/community.crypto#221).v1.6.1
Compare Source
======
Release Summary
Bugfix release.
Bugfixes
ACMEProtocolException
(Fix invalid arguments to exception ansible-collections/community.crypto#216, ACME exception fixes ansible-collections/community.crypto#217).v1.6.0
Compare Source
======
Release Summary
Fixes compatibility issues with the latest ansible-core 2.11 beta, and contains a lot of internal refactoring for the ACME modules and support for private key passphrases for them.
Minor Changes
acme
module_utils has been split up into several Python modules (ACME module_utils refactor ansible-collections/community.crypto#184).cryptography
backend (acme modules: allow to specify passphrase for account key ansible-collections/community.crypto#197, acme_* modules: support private key passprases ansible-collections/community.crypto#207).cryptography
backend (acme_* modules: support private key passprases ansible-collections/community.crypto#207).private_key_passphrase
parameter (acme_* modules: support private key passprases ansible-collections/community.crypto#207).Deprecated Features
acme
module_utils (ansible_collections.community.crypto.plugins.module_utils.acme
) is deprecated and will be removed in community.crypto 2.0.0. Use the new Python modules in theacme
package instead (ansible_collections.community.crypto.plugins.module_utils.acme.xxx
) (ACME module_utils refactor ansible-collections/community.crypto#184).Bugfixes
v1.5.0
Compare Source
======
Release Summary
Regular feature and bugfix release. Deprecates a return value.
Minor Changes
retrieve_orders
is notignore
and the ACME server allows to query orders, the new return valueorder_uris
is always populated with a list of URIs (acme_account_info: deprecate returning orders when retrieve_orders=url_list ansible-collections/community.crypto#178).sector_size
parameter (luks_device: add sector_size option ansible-collections/community.crypto#193).Deprecated Features
retrieve_orders=url_list
,orders
will no longer be returned in community.crypto 2.0.0. Useorder_uris
instead (acme_account_info: deprecate returning orders when retrieve_orders=url_list ansible-collections/community.crypto#178).Bugfixes
basic_constraints
is specified (openssl_csr: fails if existing CSR has no basic constraint but new one does ansible-collections/community.crypto#179, openssl_csr: handle missing basic constraint ansible-collections/community.crypto#180).Configuration
📅 Schedule: At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by WhiteSource Renovate. View repository job log here.