- Issued:
- 2018-10-17
- Updated:
- 2018-10-17
RHEA-2018:2936 - Product Enhancement Advisory
Synopsis
Ansible 2.7.0 for Ansible Engine 2 on ppc64le
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Ansible 2.7.0 release for Ansible Engine 2
Description
v2.7.0
======
Release Summary
- --------------
| Release Date: 2018-10-04
| `Porting Guide
<https://docs.ansible.com/ansible/devel/porting_guides.html>`__
Major Changes
- ------------
- Allow config to enable native jinja types
(https://github.com/ansible/ansible/pull/32738)
- Extends `module_defaults` by adding a prefix to defaults `group/` which
denotes a builtin or user-specified list of modules, such as `group/aws` or
`group/gcp`
- New keyword `ignore_unreachable` for plays and blocks. Allows ignoring
tasks that fail due to unreachable hosts, and check results with `is
unreachable` test.
- New yumdnf module defines the shared argument specification for both yum
and dnf modules and provides an entry point to share code when applicable
- Remove support for simplejson
(https://github.com/ansible/ansible/issues/42761)
- Support for running an Ansible controller with Python-2.6 has been
dropped. You can still manage machines which use Python-2.6 but you will
have to manage them from a machine which has Python-2.7 or Python-3.5 or
greater installed. See the `porting guide
<https://docs.ansible.com/ansible/devel/porting_guides/porting_guide_2.7.html>`_
if you need more information.
- new yum action plugin enables the yum module to work with both yum3 and
dnf-based yum4 by detecting the backend package manager and routing
commands through the correct Ansible module for that python API
- yum and dnf modules now at feature parity
Minor Changes
- ------------
- ActionBase - removed deprecated _fixup_perms method
(https://github.com/ansible/ansible/pull/44320)
- Add `is_boto3_error_code` function to `module_utils/aws/core.py` to make
it easier for modules to handle special AWS error codes.
- Add use_backend to yum module/action plugin
- Added PrivilegeUtil PowerShell module util to easily control Windows
Privileges in a process
- Added capability to skip ssl verification on zabbix host with dynamic
inventory
- Added inventory.any_unparsed_is_failed configuration setting. In an
inventory with a static hosts file and (say) ec2.py, enabling this setting
will cause a failure instead of a warning if ec2.py fails.
- Added new filter to generate random MAC addresses from a given string
acting as a prefix. Refer to the appropriate entry which has been added to
user_guide playbook_filters.rst document.
- Added the from_yaml_all filter to parse multi-document yaml strings.
Refer to the appropriate entry which as been added to user_guide
playbooks_filters.rst document.
- Ansible-2.7 changes the Ansiballz strategy for running modules remotely
so that invoking a module only needs to invoke python once per module on
the remote machine instead of twice.
- Better error handling for depsolve and transaction errors in DNF
- Changed the prefix of all Vultr modules from vr to vultr
(https://github.com/ansible/ansible/issues/42942).
- Enable installroot tests for yum4(dnf) integration testing, dnf backend
now supports that
- Explicit encoding for the output of the template module, to be able to
generate non-utf8 files from a utf-8 template.
(https://github.com/ansible/proposals/issues/121)
- File locking feature added, making it possible to gain exclusive access
to given file through module_utils.common.file.FileLock
(https://github.com/ansible/ansible/issues/29962)
- Fix dnf handling of autoremove to be compatible with yum
- Fix timer in exponential backoff algorithm in vmware.py.
- Fixed group action idempotent transactions in dnf backend
- Fixed group actions in check mode to report correct changed state
- GCP Modules will do home path expansion on service account file paths
See
https://github.com/ansible/ansible/blob/v2.7.0/changelogs/CHANGELOG-v2.7.rst for details on this release.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Ansible Engine 2 for RHEL 7 ppc64le
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Ansible Engine 2 for RHEL 7
SRPM | |
---|---|
ansible-2.7.0-1.el7ae.src.rpm | SHA-256: 09a1bf9b3ba811af59ec96a4d742ea27f0baba67bafc164e6746ba3574cca1f9 |
python-httplib2-0.9.1-2.1.el7.src.rpm | SHA-256: 37446c782412a6c82946f23a0c947dea602b87f14f9478ceadf23df5cf0fc2a5 |
python-jmespath-0.9.0-4.el7ae.src.rpm | SHA-256: 39cad65a0eda393d3a9f3fa65d357081036c3bd276b26b60aaa16f8356e8cc75 |
python-paramiko-2.1.1-4.el7.src.rpm | SHA-256: 43ba21a7cbfc99918164c9dee8e2c2ece5915b421834a00474d2bfbeb3d748b7 |
python-passlib-1.6.5-1.1.el7.src.rpm | SHA-256: 1828379b1bfd3253aefed1ad2e1fcd99898183ab12511d7fc82e3f04f0e780b6 |
sshpass-1.06-1.el7.src.rpm | SHA-256: 122016721022f9884f2a14dc0e0ebf9c091e663592f1d6350c8da17020b9a859 |
ppc64le | |
ansible-2.7.0-1.el7ae.noarch.rpm | SHA-256: 57dbb04fa7c0ed133a10abded900f87351b31b632ef17ecd23a32b62c6973c9a |
ansible-2.7.0-1.el7ae.noarch.rpm | SHA-256: 57dbb04fa7c0ed133a10abded900f87351b31b632ef17ecd23a32b62c6973c9a |
python-httplib2-0.9.1-2.1.el7.noarch.rpm | SHA-256: fe331cefb4823ea6d6551e286bb20d2f3b7a627f35d95cbe3513df69f31ad351 |
python-httplib2-0.9.1-2.1.el7.noarch.rpm | SHA-256: fe331cefb4823ea6d6551e286bb20d2f3b7a627f35d95cbe3513df69f31ad351 |
python-paramiko-2.1.1-4.el7.noarch.rpm | SHA-256: 461375b1b458818f5b5893aefac09fbf39cd651c081e63479915b8ffa33a72cc |
python-paramiko-2.1.1-4.el7.noarch.rpm | SHA-256: 461375b1b458818f5b5893aefac09fbf39cd651c081e63479915b8ffa33a72cc |
python-passlib-1.6.5-1.1.el7.noarch.rpm | SHA-256: 1785c4fc591b42974b0fae511aff1a70ddbea31a59a692e5de36791f54ecc9d9 |
python-passlib-1.6.5-1.1.el7.noarch.rpm | SHA-256: 1785c4fc591b42974b0fae511aff1a70ddbea31a59a692e5de36791f54ecc9d9 |
python2-jmespath-0.9.0-4.el7ae.noarch.rpm | SHA-256: 766862f83804267ea5fc1d6e5d2deb7a0bd29763b7c9b253ca76e83fe53eb842 |
python2-jmespath-0.9.0-4.el7ae.noarch.rpm | SHA-256: 766862f83804267ea5fc1d6e5d2deb7a0bd29763b7c9b253ca76e83fe53eb842 |
sshpass-1.06-1.el7.ppc64le.rpm | SHA-256: 994069950aa7ed89e4858123bc483483a05b84e431a3195209f9b32a46b90ae3 |
sshpass-1.06-1.el7.ppc64le.rpm | SHA-256: 994069950aa7ed89e4858123bc483483a05b84e431a3195209f9b32a46b90ae3 |
sshpass-debuginfo-1.06-1.el7.ppc64le.rpm | SHA-256: 4e31958009bc2ce0e69dcf7c499c511b0c72a19636e07d6acbfd1549c2455a52 |
sshpass-debuginfo-1.06-1.el7.ppc64le.rpm | SHA-256: 4e31958009bc2ce0e69dcf7c499c511b0c72a19636e07d6acbfd1549c2455a52 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.