Missed a cherry-pick on 1.5.2

The 1.5.2 tarball has been updated and the tag has been moved.

PyPi has been updated.


On Tue, Mar 11, 2014 at 9:00 AM, Michael DeHaan <[email protected]> wrote:

> Hello everyone, we have updated 1.5.1 with a 1.5.2 to fix a bug in the apt
> module as a result of the above.
>
> Please apply 1.5.2 instead.
>
> It should be available now and if we need to update any other modules, we
> will do so quickly.
>
> Thanks to everyone who reported things!
>
>
>
>
> On Mon, Mar 10, 2014 at 7:23 PM, Michael DeHaan <[email protected]>wrote:
>
>> Ansible 1.5.1 Release Notes
>>
>> Today we're releasing Ansible 1.5.1 which contains three security
>> fixes/upgrades as well as a few assorted bugfixes that have been applied
>> since the 1.5 release.   An upgrade is suggested for all users using vault,
>> interacting with web-properties over https://, or those users allowing
>> outside untrusted input to be passed as variables to their ansible
>> playbooks.
>>
>> The security improvements are as follows:
>>
>> Ansible Vault has been updated in terms of how the cipher logic has been
>> implemented to make the content harder to brute force.  Using the "edit" or
>> "rekey" functions in vault will automatically upgrade an existing
>> vault-encrypted file to the new format, and the new format is also the
>> method used for any new files that vault creates.   Users are encouraged to
>> upgrade their content as follows, and should also consider changing any
>> passwords or keys in vault-encrypted files to take advantage of security
>> upgrades, as the previous versions would still exist in SCM history or may
>> have been copied by another party.
>>
>> cd your_playbook_directory/
>>
>> find . -type f | xargs grep -l '$ANSIBLE_VAULT;1.0;AES' | xargs
>> ansible-vault rekey
>>
>> Note that the version of pycrypto Vault now needs is newer than what is
>> carried in the base channel of Red Hat and CentOS, so if you are using this
>> distribution you may benefit from:
>>
>> yum install python-devel
>>
>> rpm -e --nodeps python-crypto
>>
>> pip install pycrypto
>>
>> If you have a downlevel version the system will warn you about this.  If
>> you are using vault, you need not worry about this dependency.
>>
>> Core ansible modules (other than the shell module) have been upgraded to
>> avoid running user input through the shell.    Some ansible users have
>> proxied ansible behind a wrapper script or web proxy (including Ansible
>> Tower), that allows users who do not personally have access to machines to
>> be able to supply variables as input into playbook executions.  This
>> includes doing things such as providing a value to "--extra-args" that
>> might contain a semicolon, allowing them to run commands as a remote user.
>>   Removing the ability to use the shell in all of these modules prevents
>> command injection in this case.  The shell module by design executes
>> commands through the shell, so if user supplied variables are being fed to
>> things executed by the shell module, consider using the "command" module
>> instead or whether users supplying input are trustworthy.   User developed
>> modules can take advantage of these upgrades by using the "run_command"
>> function in "module_utils", which will by default not allow any form of
>> shell usage, which is now standard and required for all ansible modules in
>> core. Regardless of this fix application, users of ansible should realize
>> that any user that is allowed to write playbooks can control the systems
>> upon which the playbooks are applied, which is intentional and by design.
>>
>> Finally, code that performs URL downloads of https:// URLs has been
>> upgraded to validate the certificates where possible, unless a new
>> parameter "validate_certs=no" is passed to the module.   This ensures that
>> web servers that are interacted with are signed by a known certificate
>> authority.   It is very likely that this may require playbook alteration to
>> add a "validate_certs=no" to any modules like "get_url" that interact with
>> self-signed web services, such as continuous integration servers.   In the
>> event that this should occur, the playbook will report an appropriate error
>> message and reference the ability to add "validate_certs=no" to get around
>> the error message.
>>
>> Ansible 1.5.1 is available now on http://releases.ansible.com as well as
>> the python package index, via "pip install ansible".  It is anticipated
>> that distribution copies of the package, as well as other repositories,
>> will pick this up soon.
>>
>>
>

-- 
You received this message because you are subscribed to the Google Groups 
"Ansible Project" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/ansible-project/CAEVJ8QOHHjzQ%3D4-W15wX%3D3vv_wziVxhwEFN4S%3DfabOrZ8LerWA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to