- 27 Aug, 2015 19 commits
-
-
Brian Coca committed
-
Implement cat-like filtering behaviour for encrypt/decrypt
Toshio Kuratomi committed -
Add hash_merge and hash_merge_recursive filters with documentation
Toshio Kuratomi committed -
This is based on some code from (closed) PR #7872, but reworked based on suggestions by @abadger and the other core team members. Closes #7872 by @darkk (hash_merge/hash_replace filters) Closes #11153 by @telbizov (merged_dicts lookup plugin)
Abhijit Menon-Sen committed -
James Cammarata committed
-
Toshio Kuratomi committed
-
Don't compile .py files under .tox/
Toshio Kuratomi committed -
Remove deprecated and unused VaultAES encryption code
Brian Coca committed -
fixed hostvars access in conjunction with --limit usage
James Cammarata committed -
Abhijit Menon-Sen committed
-
Now we issue a "Reading … from stdin" prompt if our input isatty(), as gpg does. We also suppress the "x successful" confirmation message at the end if we're part of a pipeline. (The latter requires that we not close sys.stdout in VaultEditor, and for symmetry we do the same for sys.stdin, though it doesn't matter in that case.)
Abhijit Menon-Sen committed -
This allows "cat plaintext|ansible-vault encrypt > ciphertext".
Abhijit Menon-Sen committed -
This allows the following invocations: # Interactive use, like gpg ansible-vault encrypt --output x # Non-interactive, for scripting echo plaintext|ansible-vault encrypt --output x # Separate input and output files ansible-vault encrypt input.yml --output output.yml # Existing usage (in-place encryption) unchanged ansible-vault encrypt inout.yml …and the analogous cases for ansible-vault decrypt as well. In all cases, the input and output files can be '-' to read from stdin or write to stdout. This permits sensitive data to be encrypted and decrypted without ever hitting disk.Abhijit Menon-Sen committed -
Abhijit Menon-Sen committed
-
We don't need to keep creating VaultLibs everywhere, and we don't need to keep checking for errors because VaultLib does it already.
Abhijit Menon-Sen committed -
Abhijit Menon-Sen committed
-
Brian Coca committed
-
Note that this test was broken in devel because it was really just duplicating the AES256 test because setting v.cipher_name to 'AES' no longer selected AES after it was de-write-whitelisted. Now that we've removed the VaultAES encryption code, we embed static output from an earlier version and test that we can decrypt it.
Abhijit Menon-Sen committed -
Now that VaultLib always decides to use AES256 to encrypt, we don't need this broken code any more. We need to be able to decrypt this format for a while longer, but encryption support can be safely dropped.
Abhijit Menon-Sen committed
-
- 26 Aug, 2015 21 commits
-
-
Chrrrles Paul committed
-
fixes #12062
Brian Coca committed -
Ilya Epifanov committed
-
James Cammarata committed
-
Toshio Kuratomi committed
-
Fixes #11997
James Cammarata committed -
Also sets the max_fail_percentage value to the percent type.
James Cammarata committed -
ansible-lockdown added, minor editing
Brian Coca committed -
added info/link for ansible-lockdown to mailing list section, minor editing (can't help myself it seems) to the paragraph about subscribing from a non-google account
Sandra Wills committed -
fixes #12104
Brian Coca committed -
Vault cleanups, pass #1
Toshio Kuratomi committed -
Abhijit Menon-Sen committed
-
Abhijit Menon-Sen committed
-
Synchronize fix error
Toshio Kuratomi committed -
Now we don't have to recreate VaultEditor objects for each file, and so on. It also paves the way towards specifying separate input and output files later.
Abhijit Menon-Sen committed -
Brian Coca committed
-
Abhijit Menon-Sen committed
-
It's unused and unnecessary; VaultLib can decide for itself what cipher to use when encrypting. There's no need (and no provision) for the user to override the cipher via options, so there's no need for code to see if that has been done either.
Abhijit Menon-Sen committed -
Abhijit Menon-Sen committed
-
Abhijit Menon-Sen committed
-
Brian Coca committed
-