- 发布:
- 2018-10-17
- 已更新:
- 2018-10-17
RHEA-2018:2936 - Product Enhancement Advisory
概述
Ansible 2.7.0 for Ansible Engine 2 on ppc64le
类型/严重性
Product Enhancement Advisory
Red Hat Lightspeed patch analysis
识别并修复受此公告影响的系统。
标题
Ansible 2.7.0 release for Ansible Engine 2
描述
v2.7.0
======
Release Summary
- --------------
| Release Date: 2018-10-04
| `Porting Guide
<https://docs.ansible.com/ansible/devel/porting_guides.html>`__
Major Changes
- ------------
- Allow config to enable native jinja types
(https://github.com/ansible/ansible/pull/32738)
- Extends `module_defaults` by adding a prefix to defaults `group/` which
denotes a builtin or user-specified list of modules, such as `group/aws` or
`group/gcp`
- New keyword `ignore_unreachable` for plays and blocks. Allows ignoring
tasks that fail due to unreachable hosts, and check results with `is
unreachable` test.
- New yumdnf module defines the shared argument specification for both yum
and dnf modules and provides an entry point to share code when applicable
- Remove support for simplejson
(https://github.com/ansible/ansible/issues/42761)
- Support for running an Ansible controller with Python-2.6 has been
dropped. You can still manage machines which use Python-2.6 but you will
have to manage them from a machine which has Python-2.7 or Python-3.5 or
greater installed. See the `porting guide
<https://docs.ansible.com/ansible/devel/porting_guides/porting_guide_2.7.html>`_
if you need more information.
- new yum action plugin enables the yum module to work with both yum3 and
dnf-based yum4 by detecting the backend package manager and routing
commands through the correct Ansible module for that python API
- yum and dnf modules now at feature parity
Minor Changes
- ------------
- ActionBase - removed deprecated _fixup_perms method
(https://github.com/ansible/ansible/pull/44320)
- Add `is_boto3_error_code` function to `module_utils/aws/core.py` to make
it easier for modules to handle special AWS error codes.
- Add use_backend to yum module/action plugin
- Added PrivilegeUtil PowerShell module util to easily control Windows
Privileges in a process
- Added capability to skip ssl verification on zabbix host with dynamic
inventory
- Added inventory.any_unparsed_is_failed configuration setting. In an
inventory with a static hosts file and (say) ec2.py, enabling this setting
will cause a failure instead of a warning if ec2.py fails.
- Added new filter to generate random MAC addresses from a given string
acting as a prefix. Refer to the appropriate entry which has been added to
user_guide playbook_filters.rst document.
- Added the from_yaml_all filter to parse multi-document yaml strings.
Refer to the appropriate entry which as been added to user_guide
playbooks_filters.rst document.
- Ansible-2.7 changes the Ansiballz strategy for running modules remotely
so that invoking a module only needs to invoke python once per module on
the remote machine instead of twice.
- Better error handling for depsolve and transaction errors in DNF
- Changed the prefix of all Vultr modules from vr to vultr
(https://github.com/ansible/ansible/issues/42942).
- Enable installroot tests for yum4(dnf) integration testing, dnf backend
now supports that
- Explicit encoding for the output of the template module, to be able to
generate non-utf8 files from a utf-8 template.
(https://github.com/ansible/proposals/issues/121)
- File locking feature added, making it possible to gain exclusive access
to given file through module_utils.common.file.FileLock
(https://github.com/ansible/ansible/issues/29962)
- Fix dnf handling of autoremove to be compatible with yum
- Fix timer in exponential backoff algorithm in vmware.py.
- Fixed group action idempotent transactions in dnf backend
- Fixed group actions in check mode to report correct changed state
- GCP Modules will do home path expansion on service account file paths
See
https://github.com/ansible/ansible/blob/v2.7.0/changelogs/CHANGELOG-v2.7.rst for details on this release.
解决方案
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
受影响的产品
- Red Hat Ansible Engine 2 for RHEL 7 ppc64le
修复
(none)CVE
(none)
参考
(none)
Red Hat Ansible Engine 2 for RHEL 7
| SRPM | |
|---|---|
| ansible-2.7.0-1.el7ae.src.rpm | SHA-256: 09a1bf9b3ba811af59ec96a4d742ea27f0baba67bafc164e6746ba3574cca1f9 |
| python-httplib2-0.9.1-2.1.el7.src.rpm | SHA-256: 37446c782412a6c82946f23a0c947dea602b87f14f9478ceadf23df5cf0fc2a5 |
| python-jmespath-0.9.0-4.el7ae.src.rpm | SHA-256: 39cad65a0eda393d3a9f3fa65d357081036c3bd276b26b60aaa16f8356e8cc75 |
| python-paramiko-2.1.1-4.el7.src.rpm | SHA-256: 43ba21a7cbfc99918164c9dee8e2c2ece5915b421834a00474d2bfbeb3d748b7 |
| python-passlib-1.6.5-1.1.el7.src.rpm | SHA-256: 1828379b1bfd3253aefed1ad2e1fcd99898183ab12511d7fc82e3f04f0e780b6 |
| sshpass-1.06-1.el7.src.rpm | SHA-256: 122016721022f9884f2a14dc0e0ebf9c091e663592f1d6350c8da17020b9a859 |
| ppc64le | |
| ansible-2.7.0-1.el7ae.noarch.rpm | SHA-256: 57dbb04fa7c0ed133a10abded900f87351b31b632ef17ecd23a32b62c6973c9a |
| ansible-2.7.0-1.el7ae.noarch.rpm | SHA-256: 57dbb04fa7c0ed133a10abded900f87351b31b632ef17ecd23a32b62c6973c9a |
| python-httplib2-0.9.1-2.1.el7.noarch.rpm | SHA-256: fe331cefb4823ea6d6551e286bb20d2f3b7a627f35d95cbe3513df69f31ad351 |
| python-httplib2-0.9.1-2.1.el7.noarch.rpm | SHA-256: fe331cefb4823ea6d6551e286bb20d2f3b7a627f35d95cbe3513df69f31ad351 |
| python-paramiko-2.1.1-4.el7.noarch.rpm | SHA-256: 461375b1b458818f5b5893aefac09fbf39cd651c081e63479915b8ffa33a72cc |
| python-paramiko-2.1.1-4.el7.noarch.rpm | SHA-256: 461375b1b458818f5b5893aefac09fbf39cd651c081e63479915b8ffa33a72cc |
| python-passlib-1.6.5-1.1.el7.noarch.rpm | SHA-256: 1785c4fc591b42974b0fae511aff1a70ddbea31a59a692e5de36791f54ecc9d9 |
| python-passlib-1.6.5-1.1.el7.noarch.rpm | SHA-256: 1785c4fc591b42974b0fae511aff1a70ddbea31a59a692e5de36791f54ecc9d9 |
| python2-jmespath-0.9.0-4.el7ae.noarch.rpm | SHA-256: 766862f83804267ea5fc1d6e5d2deb7a0bd29763b7c9b253ca76e83fe53eb842 |
| python2-jmespath-0.9.0-4.el7ae.noarch.rpm | SHA-256: 766862f83804267ea5fc1d6e5d2deb7a0bd29763b7c9b253ca76e83fe53eb842 |
| sshpass-1.06-1.el7.ppc64le.rpm | SHA-256: 994069950aa7ed89e4858123bc483483a05b84e431a3195209f9b32a46b90ae3 |
| sshpass-1.06-1.el7.ppc64le.rpm | SHA-256: 994069950aa7ed89e4858123bc483483a05b84e431a3195209f9b32a46b90ae3 |
| sshpass-debuginfo-1.06-1.el7.ppc64le.rpm | SHA-256: 4e31958009bc2ce0e69dcf7c499c511b0c72a19636e07d6acbfd1549c2455a52 |
| sshpass-debuginfo-1.06-1.el7.ppc64le.rpm | SHA-256: 4e31958009bc2ce0e69dcf7c499c511b0c72a19636e07d6acbfd1549c2455a52 |
Red Hat 安全团队联络方式为 secalert@redhat.com。 更多联络细节请参考 https://access.redhat.com/security/team/contact/。