- 27 Aug, 2015 23 commits
-
-
This syntax is valid in Python 2.6+ and 3.x.
Marius Gedminas committed -
It's not allowed in Python 3 and merely a bad idea in Python 2.
Marius Gedminas committed -
This syntax works on Python 2.6 through 3.x. lib/ansible/module_utils (and lib/ansible/modules) need to support Python 2.4, so I didn't touch those.
Marius Gedminas committed -
Brian Coca committed
-
Brian Coca committed
-
Implement cat-like filtering behaviour for encrypt/decrypt
Toshio Kuratomi committed -
Add hash_merge and hash_merge_recursive filters with documentation
Toshio Kuratomi committed -
This is based on some code from (closed) PR #7872, but reworked based on suggestions by @abadger and the other core team members. Closes #7872 by @darkk (hash_merge/hash_replace filters) Closes #11153 by @telbizov (merged_dicts lookup plugin)
Abhijit Menon-Sen committed -
James Cammarata committed
-
Toshio Kuratomi committed
-
Don't compile .py files under .tox/
Toshio Kuratomi committed -
Remove deprecated and unused VaultAES encryption code
Brian Coca committed -
fixed hostvars access in conjunction with --limit usage
James Cammarata committed -
Abhijit Menon-Sen committed
-
Now we issue a "Reading … from stdin" prompt if our input isatty(), as gpg does. We also suppress the "x successful" confirmation message at the end if we're part of a pipeline. (The latter requires that we not close sys.stdout in VaultEditor, and for symmetry we do the same for sys.stdin, though it doesn't matter in that case.)
Abhijit Menon-Sen committed -
This allows "cat plaintext|ansible-vault encrypt > ciphertext".
Abhijit Menon-Sen committed -
This allows the following invocations: # Interactive use, like gpg ansible-vault encrypt --output x # Non-interactive, for scripting echo plaintext|ansible-vault encrypt --output x # Separate input and output files ansible-vault encrypt input.yml --output output.yml # Existing usage (in-place encryption) unchanged ansible-vault encrypt inout.yml …and the analogous cases for ansible-vault decrypt as well. In all cases, the input and output files can be '-' to read from stdin or write to stdout. This permits sensitive data to be encrypted and decrypted without ever hitting disk.
Abhijit Menon-Sen committed -
Abhijit Menon-Sen committed
-
We don't need to keep creating VaultLibs everywhere, and we don't need to keep checking for errors because VaultLib does it already.
Abhijit Menon-Sen committed -
Abhijit Menon-Sen committed
-
Brian Coca committed
-
Note that this test was broken in devel because it was really just duplicating the AES256 test because setting v.cipher_name to 'AES' no longer selected AES after it was de-write-whitelisted. Now that we've removed the VaultAES encryption code, we embed static output from an earlier version and test that we can decrypt it.
Abhijit Menon-Sen committed -
Now that VaultLib always decides to use AES256 to encrypt, we don't need this broken code any more. We need to be able to decrypt this format for a while longer, but encryption support can be safely dropped.
Abhijit Menon-Sen committed
-
- 26 Aug, 2015 17 commits
-
-
Chrrrles Paul committed
-
fixes #12062
Brian Coca committed -
Ilya Epifanov committed
-
James Cammarata committed
-
Toshio Kuratomi committed
-
Fixes #11997
James Cammarata committed -
Also sets the max_fail_percentage value to the percent type.
James Cammarata committed -
ansible-lockdown added, minor editing
Brian Coca committed -
added info/link for ansible-lockdown to mailing list section, minor editing (can't help myself it seems) to the paragraph about subscribing from a non-google account
Sandra Wills committed -
fixes #12104
Brian Coca committed -
Vault cleanups, pass #1
Toshio Kuratomi committed -
Abhijit Menon-Sen committed
-
Abhijit Menon-Sen committed
-
Synchronize fix error
Toshio Kuratomi committed -
Now we don't have to recreate VaultEditor objects for each file, and so on. It also paves the way towards specifying separate input and output files later.
Abhijit Menon-Sen committed -
Brian Coca committed
-
Abhijit Menon-Sen committed
-