1 | 1 |
new file mode 100644 |
... | ... |
@@ -0,0 +1,4 @@ |
0 |
+security_fixes: |
|
1 |
+- "avi_webhook - mark the ``verification_token`` parameter as ``no_log`` to prevent potential leaking of secret values (https://github.com/ansible-collections/community.network/pull/223)." |
|
2 |
+- "avi_sslkeyandcertificate - mark the ``enckey_base64`` parameter as ``no_log`` to prevent potential leaking of secret values (https://github.com/ansible-collections/community.network/pull/223)." |
|
3 |
+- "avi_cloudconnectoruser - mark the ``azure_userpass`` parameter as ``no_log`` to prevent leaking of secret values (https://github.com/ansible-collections/community.network/pull/223)." |
... | ... |
@@ -110,7 +110,7 @@ def main(): |
110 | 110 |
choices=['put', 'patch']), |
111 | 111 |
avi_api_patch_op=dict(choices=['add', 'replace', 'delete']), |
112 | 112 |
azure_serviceprincipal=dict(type='dict',), |
113 |
- azure_userpass=dict(type='dict',), |
|
113 |
+ azure_userpass=dict(type='dict', no_log=True), |
|
114 | 114 |
name=dict(type='str', required=True), |
115 | 115 |
private_key=dict(type='str', no_log=True,), |
116 | 116 |
public_key=dict(type='str',), |
... | ... |
@@ -147,7 +147,7 @@ def main(): |
147 | 147 |
certificate_management_profile_ref=dict(type='str',), |
148 | 148 |
created_by=dict(type='str',), |
149 | 149 |
dynamic_params=dict(type='list',), |
150 |
- enckey_base64=dict(type='str',), |
|
150 |
+ enckey_base64=dict(type='str', no_log=True), |
|
151 | 151 |
enckey_name=dict(type='str',), |
152 | 152 |
hardwaresecuritymodulegroup_ref=dict(type='str',), |
153 | 153 |
key=dict(type='str', no_log=True,), |
... | ... |
@@ -110,7 +110,7 @@ def main(): |
110 | 110 |
tenant_ref=dict(type='str',), |
111 | 111 |
url=dict(type='str',), |
112 | 112 |
uuid=dict(type='str',), |
113 |
- verification_token=dict(type='str',), |
|
113 |
+ verification_token=dict(type='str', no_log=True), |
|
114 | 114 |
) |
115 | 115 |
argument_specs.update(avi_common_argument_spec()) |
116 | 116 |
module = AnsibleModule( |