summaryrefslogtreecommitdiffstats
path: root/ansible_collections/community/hashi_vault/changelogs/changelog.yaml
diff options
context:
space:
mode:
Diffstat (limited to 'ansible_collections/community/hashi_vault/changelogs/changelog.yaml')
-rw-r--r--ansible_collections/community/hashi_vault/changelogs/changelog.yaml646
1 files changed, 646 insertions, 0 deletions
diff --git a/ansible_collections/community/hashi_vault/changelogs/changelog.yaml b/ansible_collections/community/hashi_vault/changelogs/changelog.yaml
new file mode 100644
index 000000000..cd982ec0e
--- /dev/null
+++ b/ansible_collections/community/hashi_vault/changelogs/changelog.yaml
@@ -0,0 +1,646 @@
+ancestor: null
+releases:
+ 0.1.0:
+ changes:
+ release_summary: 'Our first release matches the ``hashi_vault`` lookup functionality
+ provided by ``community.general`` version ``1.3.0``.
+
+ '
+ fragments:
+ - 0.1.0.yml
+ release_date: '2020-12-02'
+ 0.2.0:
+ changes:
+ bugfixes:
+ - hashi_vault - ``mount_point`` parameter did not work with ``aws_iam_login``
+ auth method (https://github.com/ansible-collections/community.hashi_vault/issues/7)
+ - hashi_vault - fallback logic for handling deprecated style of auth in hvac
+ was not implemented correctly (https://github.com/ansible-collections/community.hashi_vault/pull/33).
+ - hashi_vault - parameter ``mount_point`` does not work with JWT auth (https://github.com/ansible-collections/community.hashi_vault/issues/29).
+ - hashi_vault - tokens without ``lookup-self`` ability can't be used because
+ of validation (https://github.com/ansible-collections/community.hashi_vault/issues/18).
+ deprecated_features:
+ - hashi_vault - ``VAULT_ADDR`` environment variable for option ``url`` will
+ have its precedence lowered in 1.0.0; use ``ANSIBLE_HASHI_VAULT_ADDR`` to
+ intentionally override a config value (https://github.com/ansible-collections/community.hashi_vault/issues/8).
+ - hashi_vault - ``VAULT_AUTH_METHOD`` environment variable for option ``auth_method``
+ will be removed in 2.0.0, use ``ANSIBLE_HASHI_VAULT_AUTH_METHOD`` instead
+ (https://github.com/ansible-collections/community.hashi_vault/issues/17).
+ - hashi_vault - ``VAULT_ROLE_ID`` environment variable for option ``role_id``
+ will be removed in 2.0.0, use ``ANSIBLE_HASHI_VAULT_ROLE_ID`` instead (https://github.com/ansible-collections/community.hashi_vault/issues/20).
+ - hashi_vault - ``VAULT_SECRET_ID`` environment variable for option ``secret_id``
+ will be removed in 2.0.0, use ``ANSIBLE_HASHI_VAULT_SECRET_ID`` instead (https://github.com/ansible-collections/community.hashi_vault/issues/20).
+ - hashi_vault - ``VAULT_TOKEN_FILE`` environment variable for option ``token_file``
+ will be removed in 2.0.0, use ``ANSIBLE_HASHI_VAULT_TOKEN_FILE`` instead (https://github.com/ansible-collections/community.hashi_vault/issues/15).
+ - hashi_vault - ``VAULT_TOKEN_PATH`` environment variable for option ``token_path``
+ will be removed in 2.0.0, use ``ANSIBLE_HASHI_VAULT_TOKEN_PATH`` instead (https://github.com/ansible-collections/community.hashi_vault/issues/15).
+ minor_changes:
+ - Add optional ``aws_iam_server_id`` parameter as the value for ``X-Vault-AWS-IAM-Server-ID``
+ header (https://github.com/ansible-collections/community.hashi_vault/pull/27).
+ - hashi_vault - ``ANSIBLE_HASHI_VAULT_ADDR`` environment variable added for
+ option ``url`` (https://github.com/ansible-collections/community.hashi_vault/issues/8).
+ - hashi_vault - ``ANSIBLE_HASHI_VAULT_AUTH_METHOD`` environment variable added
+ for option ``auth_method`` (https://github.com/ansible-collections/community.hashi_vault/issues/17).
+ - hashi_vault - ``ANSIBLE_HASHI_VAULT_ROLE_ID`` environment variable added for
+ option ``role_id`` (https://github.com/ansible-collections/community.hashi_vault/issues/20).
+ - hashi_vault - ``ANSIBLE_HASHI_VAULT_SECRET_ID`` environment variable added
+ for option ``secret_id`` (https://github.com/ansible-collections/community.hashi_vault/issues/20).
+ - hashi_vault - ``ANSIBLE_HASHI_VAULT_TOKEN_FILE`` environment variable added
+ for option ``token_file`` (https://github.com/ansible-collections/community.hashi_vault/issues/15).
+ - hashi_vault - ``ANSIBLE_HASHI_VAULT_TOKEN_PATH`` environment variable added
+ for option ``token_path`` (https://github.com/ansible-collections/community.hashi_vault/issues/15).
+ - hashi_vault - ``namespace`` parameter can be specified in INI or via env vars
+ ``ANSIBLE_HASHI_VAULT_NAMESPACE`` (new) and ``VAULT_NAMESPACE`` (lower preference) (https://github.com/ansible-collections/community.hashi_vault/issues/14).
+ - hashi_vault - ``token`` parameter can now be specified via ``ANSIBLE_HASHI_VAULT_TOKEN``
+ as well as via ``VAULT_TOKEN`` (the latter with lower preference) (https://github.com/ansible-collections/community.hashi_vault/issues/16).
+ - hashi_vault - add ``token_validate`` option to control token validation (https://github.com/ansible-collections/community.hashi_vault/pull/24).
+ - hashi_vault - uses new AppRole method in hvac 0.10.6 with fallback to deprecated
+ method with warning (https://github.com/ansible-collections/community.hashi_vault/pull/33).
+ release_summary: 'Several backwards-compatible bugfixes and enhancements in
+ this release.
+
+ Some environment variables are deprecated and have standardized replacements.'
+ fragments:
+ - 0.2.0.yml
+ - 22-hashi_vault-aws_iam_login-mount_point.yml
+ - 24-hashi_vault-token_validation.yml
+ - 25-non-breaking-env-parameter-changes.yml
+ - 27-add-hashi_vault-header_value-param.yml
+ - 31-jwt-mount_point.yml
+ - 33-approle-deprecation.yml
+ - 35-env-var-deprecations.yml
+ release_date: '2020-12-24'
+ 1.0.0:
+ changes:
+ breaking_changes:
+ - hashi_vault - the ``VAULT_ADDR`` environment variable is now checked last
+ for the ``url`` parameter. For details on which use cases are impacted, see
+ (https://github.com/ansible-collections/community.hashi_vault/issues/8).
+ release_summary: Our first major release contains a single breaking change that
+ will affect only a small subset of users. No functionality is removed. See
+ the details in the changelog to determine if you're affected and if so how
+ to transition to remediate.
+ fragments:
+ - 1.0.0.yml
+ - 41-lower-url-env-precedence.yml
+ release_date: '2020-12-30'
+ 1.1.0:
+ changes:
+ minor_changes:
+ - hashi_vault - add ``proxies`` option (https://github.com/ansible-collections/community.hashi_vault/pull/50).
+ release_summary: This release contains a new ``proxies`` option for the ``hashi_vault``
+ lookup.
+ fragments:
+ - 1.1.0.yml
+ - 50-add-proxies-option.yml
+ release_date: '2021-02-08'
+ 1.1.1:
+ changes:
+ bugfixes:
+ - hashi_vault - restore use of ``VAULT_ADDR`` environment variable as a low
+ preference env var (https://github.com/ansible-collections/community.hashi_vault/pull/61).
+ release_summary: 'This bugfix release restores the use of the ``VAULT_ADDR``
+ environment variable for setting the ``url`` option.
+
+ See the PR linked from the changelog entry for details and workarounds if
+ you cannot upgrade.'
+ fragments:
+ - 1.1.1.yml
+ - 41-fix-vault-addr.yml
+ release_date: '2021-02-24'
+ 1.1.2:
+ changes:
+ release_summary: This release contains the same functionality as 1.1.1. The
+ only change is to mark some code as internal to the collection. If you are
+ already using 1.1.1 as an end user you do not need to update.
+ fragments:
+ - 1.1.2.yml
+ release_date: '2021-03-02'
+ 1.1.3:
+ changes:
+ bugfixes:
+ - hashi_vault - userpass authentication did not work with hvac 0.9.6 or higher
+ (https://github.com/ansible-collections/community.hashi_vault/pull/68).
+ release_summary: This release fixes a bug with ``userpass`` authentication and
+ ``hvac`` versions 0.9.6 and higher.
+ fragments:
+ - 1.1.3.yml
+ - 68-fix-userpass-auth.yml
+ release_date: '2021-03-19'
+ 1.2.0:
+ changes:
+ deprecated_features:
+ - hashi_vault collection - support for Python 2 will be dropped in version ``2.0.0``
+ of ``community.hashi_vault`` (https://github.com/ansible-collections/community.hashi_vault/issues/81).
+ minor_changes:
+ - hashi_vault lookup - add ``ANSIBLE_HASHI_VAULT_CA_CERT`` env var (with ``VAULT_CACERT``
+ low-precedence fallback) for ``ca_cert`` option (https://github.com/ansible-collections/community.hashi_vault/pull/97).
+ - hashi_vault lookup - add ``ANSIBLE_HASHI_VAULT_PASSWORD`` env var and ``ansible_hashi_vault_password``
+ ansible var for ``password`` option (https://github.com/ansible-collections/community.hashi_vault/pull/96).
+ - hashi_vault lookup - add ``ANSIBLE_HASHI_VAULT_USERNAME`` env var and ``ansible_hashi_vault_username``
+ ansible var for ``username`` option (https://github.com/ansible-collections/community.hashi_vault/pull/96).
+ - hashi_vault lookup - add ``ansible_hashi_vault_auth_method`` Ansible vars
+ entry to the ``proxies`` option (https://github.com/ansible-collections/community.hashi_vault/pull/86).
+ - hashi_vault lookup - add ``ansible_hashi_vault_ca_cert`` ansible var for ``ca_cert``
+ option (https://github.com/ansible-collections/community.hashi_vault/pull/97).
+ - hashi_vault lookup - add ``ansible_hashi_vault_namespace`` Ansible vars entry
+ to the ``namespace`` option (https://github.com/ansible-collections/community.hashi_vault/pull/86).
+ - hashi_vault lookup - add ``ansible_hashi_vault_proxies`` Ansible vars entry
+ to the ``proxies`` option (https://github.com/ansible-collections/community.hashi_vault/pull/86).
+ - hashi_vault lookup - add ``ansible_hashi_vault_role_id`` Ansible vars entry
+ to the ``proxies`` option (https://github.com/ansible-collections/community.hashi_vault/pull/86).
+ - hashi_vault lookup - add ``ansible_hashi_vault_secret_id`` Ansible vars entry
+ to the ``proxies`` option (https://github.com/ansible-collections/community.hashi_vault/pull/86).
+ - hashi_vault lookup - add ``ansible_hashi_vault_token_file`` Ansible vars entry
+ to the ``token_file`` option (https://github.com/ansible-collections/community.hashi_vault/pull/95).
+ - hashi_vault lookup - add ``ansible_hashi_vault_token_path`` Ansible vars entry
+ to the ``token_path`` option (https://github.com/ansible-collections/community.hashi_vault/pull/95).
+ - hashi_vault lookup - add ``ansible_hashi_vault_token_validate`` Ansible vars
+ entry to the ``proxies`` option (https://github.com/ansible-collections/community.hashi_vault/pull/86).
+ - hashi_vault lookup - add ``ansible_hashi_vault_token`` Ansible vars entry
+ to the ``proxies`` option (https://github.com/ansible-collections/community.hashi_vault/pull/86).
+ - hashi_vault lookup - add ``ansible_hashi_vault_url`` and ``ansible_hashi_vault_addr``
+ Ansible vars entries to the ``url`` option (https://github.com/ansible-collections/community.hashi_vault/pull/86).
+ - hashi_vault lookup - add ``ansible_hashi_vault_validate_certs`` Ansible vars
+ entry to the ``validate_certs`` option (https://github.com/ansible-collections/community.hashi_vault/pull/95).
+ - hashi_vault lookup - add ``ca_cert`` INI config file key ``ca_cert`` option
+ (https://github.com/ansible-collections/community.hashi_vault/pull/97).
+ - hashi_vault lookup - add ``none`` auth type which allows for passive auth
+ via a Vault agent (https://github.com/ansible-collections/community.hashi_vault/pull/80).
+ release_summary: 'This release brings several new ways of accessing options,
+ like using Ansible vars, and addng new environment variables and INI config
+ entries.
+
+ A special ``none`` auth type is also added, for working with certain Vault
+ Agent configurations.
+
+ This release also announces the deprecation of Python 2 support in version
+ ``2.0.0`` of the collection.'
+ fragments:
+ - 1.2.0.yml
+ - 80-add-none-auth-type.yml
+ - 81-deprecating-python2.yml
+ - 86-add-vars-options.yml
+ - 95-more-vars-options.yml
+ - 96-userpass-vars-env.yml
+ - 97-ca_cert-env-and-vars.yml
+ release_date: '2021-06-19'
+ 1.3.0:
+ changes:
+ minor_changes:
+ - hashi_vault lookup - add ``retries`` and ``retry_action`` to enable built-in
+ retry on failure (https://github.com/ansible-collections/community.hashi_vault/pull/71).
+ - hashi_vault lookup - add ``timeout`` option to control connection timeouts
+ (https://github.com/ansible-collections/community.hashi_vault/pull/100).
+ release_summary: This release adds two connection-based options for controlling
+ timeouts and retrying failed Vault requests.
+ fragments:
+ - 1.3.0.yml
+ - 100-add-timeout-option.yml
+ - 71-add-retries.yml
+ release_date: '2021-06-28'
+ 1.3.1:
+ changes:
+ release_summary: This release fixes an error in the documentation. No functionality
+ is changed so it's not necessary to upgrade from ``1.3.0``.
+ fragments:
+ - 1.3.1.yml
+ release_date: '2021-06-30'
+ 1.3.2:
+ changes:
+ deprecated_features:
+ - hashi_vault collection - support for Python 3.5 will be dropped in version
+ ``2.0.0`` of ``community.hashi_vault`` (https://github.com/ansible-collections/community.hashi_vault/issues/81).
+ minor_changes:
+ - hashi_vault collection - add ``execution-environment.yml`` and a python requirements
+ file to better support ``ansible-builder`` (https://github.com/ansible-collections/community.hashi_vault/pull/105).
+ release_summary: 'This release adds requirements detection support for Ansible
+ Execution Environments. It also updates and adds new guides in our `collection
+ docsite <https://docs.ansible.com/ansible/devel/collections/community/hashi_vault>`_.
+
+ This release also announces the dropping of Python 3.5 support in version
+ ``2.0.0`` of the collection, alongside the previous announcement dropping
+ Python 2.x in ``2.0.0``.'
+ fragments:
+ - 1.3.2.yml
+ - 105-support-ansible-builder.yml
+ - 107-deprecating-python-35.yml
+ release_date: '2021-07-20'
+ 1.4.0:
+ changes:
+ bugfixes:
+ - aws_iam_login auth - the ``aws_security_token`` option was not used, causing
+ assumed role credentials to fail (https://github.com/ansible-collections/community.hashi_vault/issues/160).
+ - hashi_vault collection - a fallback import supporting the ``retries`` option
+ for ``urllib3`` via ``requests.packages.urllib3`` was not correctly formed
+ (https://github.com/ansible-collections/community.hashi_vault/issues/116).
+ - hashi_vault collection - unhandled exception with ``token`` auth when ``token_file``
+ exists but is a directory (https://github.com/ansible-collections/community.hashi_vault/issues/152).
+ deprecated_features:
+ - lookup hashi_vault - the ``[lookup_hashi_vault]`` section in the ``ansible.cfg``
+ file is deprecated and will be removed in collection version ``3.0.0``. Instead,
+ the section ``[hashi_vault_collection]`` can be used, which will apply to
+ all plugins in the collection going forward (https://github.com/ansible-collections/community.hashi_vault/pull/144).
+ minor_changes:
+ - community.hashi_vault collection - add cert auth method (https://github.com/ansible-collections/community.hashi_vault/pull/159).
+ release_summary: 'This release includes bugfixes, a new auth method (``cert``),
+ and the first new content since the collection''s formation, the ``vault_read``
+ module and lookup plugin.
+
+ We''re also announcing the deprecation of the ``[lookup_hashi_vault]`` INI
+ section (which will continue working up until its removal only for the ``hashi_vault``
+ lookup), to be replaced by the ``[hashi_vault_collection]`` section that will
+ apply to all plugins in the collection.'
+ fragments:
+ - 1.4.0.yml
+ - 113-retry-fallback.yml
+ - 144-deprecate-lookup-ini.yml
+ - 154-token_file must be a file.yml
+ - 159-add-cert-auth.yml
+ - 161-aws-sts-token.yml
+ modules:
+ - description: Perform a read operation against HashiCorp Vault
+ name: vault_read
+ namespace: ''
+ plugins:
+ lookup:
+ - description: Perform a read operation against HashiCorp Vault
+ name: vault_read
+ namespace: null
+ release_date: '2021-10-25'
+ 1.4.1:
+ changes:
+ bugfixes:
+ - aws_iam_login auth method - fix incorrect use of ``boto3``/``botocore`` that
+ prevented proper loading of AWS IAM role credentials (https://github.com/ansible-collections/community.hashi_vault/issues/167).
+ release_summary: This release contains a bugfix for ``aws_iam_login`` authentication.
+ fragments:
+ - 1.4.1.yml
+ - 168-aws_auth-boto-bug.yml
+ release_date: '2021-10-28'
+ 1.5.0:
+ changes:
+ minor_changes:
+ - add the ``community.hashi_vault.vault`` action group (https://github.com/ansible-collections/community.hashi_vault/pull/172).
+ - auth methods - Add support for configuring the ``mount_point`` auth method
+ option in plugins via the ``ANSIBLE_HASHI_VAULT_MOUNT_POINT`` environment
+ variable, ``ansible_hashi_vault_mount_point`` ansible variable, or ``mount_point``
+ INI section (https://github.com/ansible-collections/community.hashi_vault/pull/171).
+ release_summary: 'This release includes a new action group for use with ``module_defaults``,
+ and additional ways of specifying the ``mount_point`` option for plugins.
+
+ This will be the last ``1.x`` release.'
+ fragments:
+ - 1.5.0.yml
+ - 172-action_group.yml
+ - pr-171-envvar-for-mount-point.yaml
+ release_date: '2021-11-05'
+ 2.0.0:
+ changes:
+ breaking_changes:
+ - connection options - there is no longer a default value for the ``url`` option
+ (the Vault address), so a value must be supplied (https://github.com/ansible-collections/community.hashi_vault/issues/83).
+ release_summary: 'Version 2.0.0 of the collection drops support for Python 2
+ & Python 3.5, making Python 3.6 the minimum supported version.
+
+ Some deprecated features and settings have been removed as well.'
+ removed_features:
+ - drop support for Python 2 and Python 3.5 (https://github.com/ansible-collections/community.hashi_vault/issues/81).
+ - 'support for the following deprecated environment variables has been removed:
+ ``VAULT_AUTH_METHOD``, ``VAULT_TOKEN_PATH``, ``VAULT_TOKEN_FILE``, ``VAULT_ROLE_ID``,
+ ``VAULT_SECRET_ID`` (https://github.com/ansible-collections/community.hashi_vault/pull/173).'
+ fragments:
+ - 173-deprecated-env-vars.yml
+ - 176-url-is-required.yml
+ - 177-drop-py2-3.5.yml
+ - 2.0.0.yml
+ release_date: '2021-11-06'
+ 2.1.0:
+ changes:
+ deprecated_features:
+ - Support for Ansible 2.9 and ansible-base 2.10 is deprecated, and will be removed
+ in the next major release (community.hashi_vault 3.0.0) next spring (https://github.com/ansible-community/community-topics/issues/50,
+ https://github.com/ansible-collections/community.hashi_vault/issues/189).
+ - aws_iam_login auth method - the ``aws_iam_login`` method has been renamed
+ to ``aws_iam``. The old name will be removed in collection version ``3.0.0``.
+ Until then both names will work, and a warning will be displayed when using
+ the old name (https://github.com/ansible-collections/community.hashi_vault/pull/193).
+ release_summary: The most important change in this release is renaming the ``aws_iam_login``
+ auth method to ``aws_iam`` and deprecating the old name. This release also
+ announces the deprecation of Ansible 2.9 and ansible-base 2.10 support in
+ 3.0.0.
+ removed_features:
+ - the "legacy" integration test setup has been removed; this does not affect
+ end users and is only relevant to contributors (https://github.com/ansible-collections/community.hashi_vault/pull/191).
+ fragments:
+ - 190-deprecate-ansible-2.9-2.10.yml
+ - 191-remove-legacy-integration.yml
+ - 193-rename-aws-iam-auth.yml
+ - 2.1.0.yml
+ release_date: '2021-12-03'
+ 2.2.0:
+ changes:
+ minor_changes:
+ - The Filter guide has been added to the collection's docsite.
+ release_summary: This release contains a new lookup/module combo for logging
+ in to Vault, and includes our first filter plugin.
+ fragments:
+ - 199-vault_login-vault_login_token.yml
+ - 2.2.0.yml
+ modules:
+ - description: Perform a login operation against HashiCorp Vault
+ name: vault_login
+ namespace: ''
+ plugins:
+ filter:
+ - description: Extracts the client token from a Vault login response
+ name: vault_login_token
+ namespace: null
+ lookup:
+ - description: Perform a login operation against HashiCorp Vault
+ name: vault_login
+ namespace: null
+ release_date: '2022-01-05'
+ 2.3.0:
+ changes:
+ release_summary: This release contains new plugins and modules for creating
+ tokens and for generating certificates with Vault's PKI secrets engine.
+ fragments:
+ - 2.3.0.yml
+ modules:
+ - description: Generates a new set of credentials (private key and certificate)
+ using HashiCorp Vault PKI
+ name: vault_pki_generate_certificate
+ namespace: ''
+ - description: Create a HashiCorp Vault token
+ name: vault_token_create
+ namespace: ''
+ plugins:
+ lookup:
+ - description: Create a HashiCorp Vault token
+ name: vault_token_create
+ namespace: null
+ release_date: '2022-02-15'
+ 2.4.0:
+ changes:
+ release_summary: Our first content for writing to Vault is now live.
+ fragments:
+ - 2.4.0.yml
+ modules:
+ - description: Perform a write operation against HashiCorp Vault
+ name: vault_write
+ namespace: ''
+ plugins:
+ lookup:
+ - description: Perform a write operation against HashiCorp Vault
+ name: vault_write
+ namespace: null
+ release_date: '2022-03-31'
+ 2.5.0:
+ changes:
+ deprecated_features:
+ - token_validate options - the shared auth option ``token_validate`` will change
+ its default from ``True`` to ``False`` in community.hashi_vault version 4.0.0.
+ The ``vault_login`` lookup and module will keep the default value of ``True``
+ (https://github.com/ansible-collections/community.hashi_vault/issues/248).
+ minor_changes:
+ - vault_login module & lookup - no friendly error message was given when ``hvac``
+ was missing (https://github.com/ansible-collections/community.hashi_vault/issues/257).
+ - vault_pki_certificate - add ``vault_pki_certificate`` to the ``community.hashi_vault.vault``
+ action group (https://github.com/ansible-collections/community.hashi_vault/issues/251).
+ - vault_read module & lookup - no friendly error message was given when ``hvac``
+ was missing (https://github.com/ansible-collections/community.hashi_vault/issues/257).
+ - vault_token_create - add ``vault_token_create`` to the ``community.hashi_vault.vault``
+ action group (https://github.com/ansible-collections/community.hashi_vault/issues/251).
+ - vault_token_create module & lookup - no friendly error message was given when
+ ``hvac`` was missing (https://github.com/ansible-collections/community.hashi_vault/issues/257).
+ - vault_write - add ``vault_write`` to the ``community.hashi_vault.vault`` action
+ group (https://github.com/ansible-collections/community.hashi_vault/issues/251).
+ release_summary: 'This release finally contains dedicated KV plugins and modules,
+ and an exciting new lookup to help use plugin values in module calls.
+
+ With that, we also have a guide in the collection docsite for migrating away
+ from the ``hashi_vault`` lookup toward dedicated content.
+
+ We are also announcing that the ``token_validate`` option will change its
+ default value in version 4.0.0.
+
+ This is the last planned release before 3.0.0. See the porting guide for breaking
+ changes and removed features in the next version.'
+ fragments:
+ - 2.5.0.yml
+ - 246-action_group.yml
+ - 258-token_validate-default.yml
+ - 259-hvac-checks.yml
+ modules:
+ - description: Get a secret from HashiCorp Vault's KV version 1 secret store
+ name: vault_kv1_get
+ namespace: ''
+ - description: Get a secret from HashiCorp Vault's KV version 2 secret store
+ name: vault_kv2_get
+ namespace: ''
+ plugins:
+ lookup:
+ - description: Returns plugin settings (options)
+ name: vault_ansible_settings
+ namespace: null
+ - description: Get a secret from HashiCorp Vault's KV version 1 secret store
+ name: vault_kv1_get
+ namespace: null
+ - description: Get a secret from HashiCorp Vault's KV version 2 secret store
+ name: vault_kv2_get
+ namespace: null
+ release_date: '2022-05-11'
+ 3.0.0:
+ changes:
+ deprecated_features:
+ - token_validate options - the shared auth option ``token_validate`` will change
+ its default from ``true`` to ``false`` in community.hashi_vault version 4.0.0.
+ The ``vault_login`` lookup and module will keep the default value of ``true``
+ (https://github.com/ansible-collections/community.hashi_vault/issues/248).
+ release_summary: 'Version 3.0.0 of ``community.hashi_vault`` drops support for
+ Ansible 2.9 and ansible-base 2.10.
+
+ Several deprecated features have been removed. See the changelog for the full
+ list.'
+ removed_features:
+ - aws_iam auth - the deprecated alias ``aws_iam_login`` for the ``aws_iam``
+ value of the ``auth_method`` option has been removed (https://github.com/ansible-collections/community.hashi_vault/issues/194).
+ - community.hashi_vault collection - support for Ansible 2.9 and ansible-base
+ 2.10 has been removed (https://github.com/ansible-collections/community.hashi_vault/issues/189).
+ - hashi_vault lookup - the deprecated ``[lookup_hashi_vault]`` INI config section
+ has been removed in favor of the collection-wide ``[hashi_vault_collection]``
+ section (https://github.com/ansible-collections/community.hashi_vault/issues/179).
+ fragments:
+ - 179-remove-lookup_hashi_vault-ini.yml
+ - 189-remove-ansible-2_9-2_10-support.yml
+ - 194-remove-aws_iam_login.yml
+ - 248-token_validate-change-default.yml
+ - 3.0.0.yml
+ release_date: '2022-05-21'
+ 3.1.0:
+ changes:
+ bugfixes:
+ - Add SPDX license headers to individual files (https://github.com/ansible-collections/community.hashi_vault/pull/282).
+ - Add missing ``BSD-2-Clause.txt`` file for BSD licensed content (https://github.com/ansible-collections/community.hashi_vault/issues/275).
+ - Use the correct GPL license for plugin_utils (https://github.com/ansible-collections/community.hashi_vault/issues/276).
+ deprecated_features:
+ - vault_kv2_get lookup - the ``engine_mount_point option`` in the ``vault_kv2_get``
+ lookup only will change its default from ``kv`` to ``secret`` in community.hashi_vault
+ version 4.0.0 (https://github.com/ansible-collections/community.hashi_vault/issues/279).
+ release_summary: 'A default value that was set incorrectly will be corrected
+ in ``4.0.0``.
+
+ A deprecation warning will be shown until then if the value is not specified
+ explicitly.
+
+ This version also includes some fixes and improvements to the licensing in
+ the collection, which does not affect any functionality.'
+ fragments:
+ - 279-incorrect-kv2-lookup-default.yml
+ - 3.1.0.yml
+ - licensing.yml
+ release_date: '2022-07-17'
+ 3.2.0:
+ changes:
+ bugfixes:
+ - community.hashi_vault plugins - tokens will be cast to a string type before
+ being sent to ``hvac`` to prevent errors in ``requests`` when values are ``AnsibleUnsafe``
+ (https://github.com/ansible-collections/community.hashi_vault/issues/289).
+ - modules - fix a "variable used before assignment" that cannot be reached but
+ causes sanity test failures (https://github.com/ansible-collections/community.hashi_vault/issues/296).
+ minor_changes:
+ - community.hashi_vault collection - add support for ``azure`` auth method,
+ for Azure service principal, managed identity, or plain JWT access token (https://github.com/ansible-collections/community.hashi_vault/issues/293).
+ - community.hashi_vault retries - `HTTP status code 412 <https://www.vaultproject.io/api-docs#412>`__
+ has been added to the default list of codes to be retried, for the new `Server
+ Side Consistent Token feature <https://www.vaultproject.io/docs/faq/ssct#q-is-there-anything-else-i-need-to-consider-to-achieve-consistency-besides-upgrading-to-vault-1-10>`__
+ in Vault Enterprise (https://github.com/ansible-collections/community.hashi_vault/issues/290).
+ release_summary: This release brings support for the ``azure`` auth method,
+ adds ``412`` to the default list of HTTP status codes to be retried, and fixes
+ a bug that causes failures in token auth with ``requests>=2.28.0``.
+ fragments:
+ - 289-handle-unsafe-strings.yml
+ - 290-retry-http-412.yml
+ - 293-support-azure-auth-method.yml
+ - 296-use-before-assignment.yml
+ - 3.2.0.yml
+ release_date: '2022-08-21'
+ 3.3.0:
+ changes:
+ minor_changes:
+ - vault_token_create - creation or orphan tokens uses ``hvac``'s new v1 method
+ for creating orphans, or falls back to the v0 method if needed (https://github.com/ansible-collections/community.hashi_vault/issues/301).
+ release_summary: 'With the release of ``hvac`` version ``1.0.0``, we needed
+ to update ``vault_token_create``''s support for orphan tokens.
+
+ The collection''s changelog is now viewable in the Ansible documentation site.'
+ fragments:
+ - 3.3.0.yml
+ - 301-orphan-token-handling.yml
+ release_date: '2022-09-19'
+ 3.3.1:
+ changes:
+ release_summary: No functional changes in this release, this provides updated
+ filter documentation for the public docsite.
+ fragments:
+ - 3.3.1.yml
+ release_date: '2022-09-25'
+ 3.4.0:
+ changes:
+ bugfixes:
+ - connection options - the ``namespace`` connection option will be forced into
+ a string to ensure cmpatibility with recent ``requests`` versions (https://github.com/ansible-collections/community.hashi_vault/issues/309).
+ minor_changes:
+ - vault_pki_generate_certificate - the documentation has been updated to match
+ the argspec for the default values of options ``alt_names``, ``ip_sans``,
+ ``other_sans``, and ``uri_sans`` (https://github.com/ansible-collections/community.hashi_vault/pull/318).
+ release_summary: 'This release includes a new module, fixes (another) ``requests``
+ header issue, and updates some inaccurate documentation.
+
+ This is the last planned release before v4.0.0.'
+ fragments:
+ - 3.4.0.yml
+ - 309-stringify-namespace.yml
+ - 318-pki-argspec-doc-mismatch.yml
+ modules:
+ - description: Delete one or more versions of a secret from HashiCorp Vault's
+ KV version 2 secret store
+ name: vault_kv2_delete
+ namespace: ''
+ release_date: '2022-11-03'
+ 4.0.0:
+ changes:
+ breaking_changes:
+ - auth - the default value for ``token_validate`` has changed from ``true``
+ to ``false``, as previously announced (https://github.com/ansible-collections/community.hashi_vault/issues/248).
+ - vault_kv2_get lookup - as previously announced, the default value for ``engine_mount_point``
+ in the ``vault_kv2_get`` lookup has changed from ``kv`` to ``secret`` (https://github.com/ansible-collections/community.hashi_vault/issues/279).
+ minor_changes:
+ - modules - all modules now document their action group and support for check
+ mode in their attributes documentation (https://github.com/ansible-collections/community.hashi_vault/issues/197).
+ release_summary: The next major version of the collection includes previously
+ announced breaking changes to some default values, and improvements to module
+ documentation with attributes that describe the use of action groups and check
+ mode support.
+ fragments:
+ - 197-module-attributes.yml
+ - 248-token_validate-default.yml
+ - 279-vault_kv2_get-lookup-mount-default.yml
+ - 4.0.0.yml
+ release_date: '2022-11-05'
+ 4.1.0:
+ changes:
+ deprecated_features:
+ - ansible-core - support for ``ansible-core`` versions ``2.11`` and ``2.12``
+ will be dropped in collection version ``5.0.0``, making ``2.13`` the minimum
+ supported version of ``ansible-core`` (https://github.com/ansible-collections/community.hashi_vault/issues/340).
+ - hvac - the minimum version of ``hvac`` to be supported in collection version
+ ``5.0.0`` will be at least ``1.0.2``; this minimum may be raised before ``5.0.0``
+ is released, so please subscribe to the linked issue and look out for new
+ notices in the changelog (https://github.com/ansible-collections/community.hashi_vault/issues/324).
+ release_summary: 'This release brings new generic ``vault_list`` plugins from
+ a new contributor!
+
+ There are also some deprecation notices for the next major version, and some
+ updates to documentation attributes.'
+ fragments:
+ - 324-deprecate-hvac.yml
+ - 325-fix attributes.yml
+ - 340-deprecate-core-211-212.yml
+ - 4.1.0.yml
+ modules:
+ - description: Perform a list operation against HashiCorp Vault
+ name: vault_list
+ namespace: ''
+ plugins:
+ lookup:
+ - description: Perform a list operation against HashiCorp Vault
+ name: vault_list
+ namespace: null
+ release_date: '2023-01-18'
+ 4.2.0:
+ changes:
+ bugfixes:
+ - hashi_vault lookup - a term string with duplicate options would silently use
+ the last value. The lookup now shows a warning on option duplication (https://github.com/ansible-collections/community.hashi_vault/issues/349).
+ deprecated_features:
+ - hashi_vault lookup - in ``v5.0.0`` duplicate term string options will raise
+ an exception instead of showing a warning (https://github.com/ansible-collections/community.hashi_vault/issues/356).
+ release_summary: This release contains a new module for KVv2 writes, and a new
+ warning for duplicated term string options in the ``hashi_vault`` lookup.
+ fragments:
+ - 350-raise-error-on-option-duplication-in-term-string.yml
+ - 4.2.0.yml
+ modules:
+ - description: Perform a write operation against a KVv2 secret in HashiCorp Vault
+ name: vault_kv2_write
+ namespace: ''
+ release_date: '2023-03-26'
+ 4.2.1:
+ changes:
+ release_summary: This patch version updates the documentation for the ``vault_kv2_write``
+ module. There are no functional changes.
+ fragments:
+ - 4.2.1.yml
+ release_date: '2023-04-27'