diff --git a/CHANGELOG.md b/CHANGELOG.md
index f54352a8..1652a3ad 100644
--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -1,217 +1,224 @@
# Community Crypto Release Notes
**Topics**
-- v2\.18\.0
- - Release Summary
- - Minor Changes
- - Deprecated Features
- - Bugfixes
- - New Plugins
- - Filter
-- v2\.17\.1
- - Release Summary
- - Bugfixes
-- v2\.17\.0
- - Release Summary
- - Minor Changes
-- v2\.16\.2
- - Release Summary
- - Bugfixes
-- v2\.16\.1
- - Release Summary
- - Bugfixes
-- v2\.16\.0
- - Release Summary
- - Minor Changes
- - Bugfixes
-- v2\.15\.1
- - Release Summary
- - Bugfixes
-- v2\.15\.0
- - Release Summary
- - Minor Changes
- - Deprecated Features
- - Bugfixes
- - New Plugins
- - Filter
- - Lookup
-- v2\.14\.1
- - Release Summary
- - Bugfixes
- - Known Issues
-- v2\.14\.0
- - Release Summary
- - Minor Changes
-- v2\.13\.1
- - Release Summary
- - Bugfixes
-- v2\.13\.0
- - Release Summary
- - Minor Changes
- - Deprecated Features
- - Bugfixes
-- v2\.12\.0
- - Release Summary
- - Minor Changes
-- v2\.11\.1
- - Release Summary
-- v2\.11\.0
- - Release Summary
- - Minor Changes
- - Bugfixes
-- v2\.10\.0
- - Release Summary
- - Bugfixes
- - New Plugins
- - Filter
-- v2\.9\.0
- - Release Summary
- - Minor Changes
-- v2\.8\.1
- - Release Summary
-- v2\.8\.0
- - Release Summary
- - Minor Changes
-- v2\.7\.1
- - Release Summary
- - Bugfixes
-- v2\.7\.0
- - Release Summary
- - Minor Changes
- - Bugfixes
-- v2\.6\.0
- - Release Summary
- - Minor Changes
-- v2\.5\.0
- - Release Summary
- - Minor Changes
-- v2\.4\.0
- - Release Summary
- - Deprecated Features
- - Bugfixes
-- v2\.3\.4
- - Release Summary
-- v2\.3\.3
- - Release Summary
- - Bugfixes
-- v2\.3\.2
- - Release Summary
- - Bugfixes
-- v2\.3\.1
- - Release Summary
- - Bugfixes
-- v2\.3\.0
- - Release Summary
- - Minor Changes
- - Bugfixes
-- v2\.2\.4
- - Release Summary
- - Bugfixes
-- v2\.2\.3
- - Release Summary
- - Bugfixes
-- v2\.2\.2
- - Release Summary
- - Bugfixes
-- v2\.2\.1
- - Release Summary
- - Bugfixes
-- v2\.2\.0
- - Release Summary
- - Minor Changes
- - Bugfixes
-- v2\.1\.0
- - Release Summary
- - Minor Changes
- - Bugfixes
- - New Modules
-- v2\.0\.2
- - Release Summary
-- v2\.0\.1
- - Release Summary
- - Minor Changes
- - Bugfixes
-- v2\.0\.0
- - Release Summary
- - Minor Changes
- - Breaking Changes / Porting Guide
- - Deprecated Features
- - Removed Features \(previously deprecated\)
- - Bugfixes
-- v1\.9\.4
- - Release Summary
- - Bugfixes
-- v1\.9\.3
- - Release Summary
- - Bugfixes
-- v1\.9\.2
- - Release Summary
-- v1\.9\.1
- - Release Summary
-- v1\.9\.0
- - Release Summary
- - Minor Changes
- - Bugfixes
-- v1\.8\.0
- - Release Summary
- - Minor Changes
- - Bugfixes
-- v1\.7\.1
- - Release Summary
- - Bugfixes
-- v1\.7\.0
- - Release Summary
- - Minor Changes
- - Bugfixes
- - New Modules
-- v1\.6\.2
- - Release Summary
- - Bugfixes
-- v1\.6\.1
- - Release Summary
- - Bugfixes
-- v1\.6\.0
- - Release Summary
- - Minor Changes
- - Deprecated Features
- - Bugfixes
-- v1\.5\.0
- - Release Summary
- - Minor Changes
- - Deprecated Features
- - Bugfixes
-- v1\.4\.0
- - Release Summary
- - Minor Changes
- - Bugfixes
-- v1\.3\.0
- - Release Summary
- - Minor Changes
- - Bugfixes
- - New Modules
-- v1\.2\.0
- - Release Summary
- - Minor Changes
- - Security Fixes
- - Bugfixes
-- v1\.1\.1
- - Release Summary
- - Bugfixes
-- v1\.1\.0
- - Release Summary
- - Minor Changes
- - Bugfixes
- - New Modules
-- v1\.0\.0
- - Release Summary
- - Minor Changes
- - Deprecated Features
- - Removed Features \(previously deprecated\)
- - Bugfixes
- - New Modules
-
-## v2\.18\.0
+- v2\.19\.0
+ - Release Summary
+ - Minor Changes
+ - Deprecated Features
+ - Bugfixes
+ - New Modules
+- v2\.18\.0
+ - Release Summary
+ - Minor Changes
+ - Deprecated Features
+ - Bugfixes
+ - New Plugins
+ - Filter
+- v2\.17\.1
+ - Release Summary
+ - Bugfixes
+- v2\.17\.0
+ - Release Summary
+ - Minor Changes
+- v2\.16\.2
+ - Release Summary
+ - Bugfixes
+- v2\.16\.1
+ - Release Summary
+ - Bugfixes
+- v2\.16\.0
+ - Release Summary
+ - Minor Changes
+ - Bugfixes
+- v2\.15\.1
+ - Release Summary
+ - Bugfixes
+- v2\.15\.0
+ - Release Summary
+ - Minor Changes
+ - Deprecated Features
+ - Bugfixes
+ - New Plugins
+ - Filter
+ - Lookup
+- v2\.14\.1
+ - Release Summary
+ - Bugfixes
+ - Known Issues
+- v2\.14\.0
+ - Release Summary
+ - Minor Changes
+- v2\.13\.1
+ - Release Summary
+ - Bugfixes
+- v2\.13\.0
+ - Release Summary
+ - Minor Changes
+ - Deprecated Features
+ - Bugfixes
+- v2\.12\.0
+ - Release Summary
+ - Minor Changes
+- v2\.11\.1
+ - Release Summary
+- v2\.11\.0
+ - Release Summary
+ - Minor Changes
+ - Bugfixes
+- v2\.10\.0
+ - Release Summary
+ - Bugfixes
+ - New Plugins
+ - Filter
+- v2\.9\.0
+ - Release Summary
+ - Minor Changes
+- v2\.8\.1
+ - Release Summary
+- v2\.8\.0
+ - Release Summary
+ - Minor Changes
+- v2\.7\.1
+ - Release Summary
+ - Bugfixes
+- v2\.7\.0
+ - Release Summary
+ - Minor Changes
+ - Bugfixes
+- v2\.6\.0
+ - Release Summary
+ - Minor Changes
+- v2\.5\.0
+ - Release Summary
+ - Minor Changes
+- v2\.4\.0
+ - Release Summary
+ - Deprecated Features
+ - Bugfixes
+- v2\.3\.4
+ - Release Summary
+- v2\.3\.3
+ - Release Summary
+ - Bugfixes
+- v2\.3\.2
+ - Release Summary
+ - Bugfixes
+- v2\.3\.1
+ - Release Summary
+ - Bugfixes
+- v2\.3\.0
+ - Release Summary
+ - Minor Changes
+ - Bugfixes
+- v2\.2\.4
+ - Release Summary
+ - Bugfixes
+- v2\.2\.3
+ - Release Summary
+ - Bugfixes
+- v2\.2\.2
+ - Release Summary
+ - Bugfixes
+- v2\.2\.1
+ - Release Summary
+ - Bugfixes
+- v2\.2\.0
+ - Release Summary
+ - Minor Changes
+ - Bugfixes
+- v2\.1\.0
+ - Release Summary
+ - Minor Changes
+ - Bugfixes
+ - New Modules
+- v2\.0\.2
+ - Release Summary
+- v2\.0\.1
+ - Release Summary
+ - Minor Changes
+ - Bugfixes
+- v2\.0\.0
+ - Release Summary
+ - Minor Changes
+ - Breaking Changes / Porting Guide
+ - Deprecated Features
+ - Removed Features \(previously deprecated\)
+ - Bugfixes
+- v1\.9\.4
+ - Release Summary
+ - Bugfixes
+- v1\.9\.3
+ - Release Summary
+ - Bugfixes
+- v1\.9\.2
+ - Release Summary
+- v1\.9\.1
+ - Release Summary
+- v1\.9\.0
+ - Release Summary
+ - Minor Changes
+ - Bugfixes
+- v1\.8\.0
+ - Release Summary
+ - Minor Changes
+ - Bugfixes
+- v1\.7\.1
+ - Release Summary
+ - Bugfixes
+- v1\.7\.0
+ - Release Summary
+ - Minor Changes
+ - Bugfixes
+ - New Modules
+- v1\.6\.2
+ - Release Summary
+ - Bugfixes
+- v1\.6\.1
+ - Release Summary
+ - Bugfixes
+- v1\.6\.0
+ - Release Summary
+ - Minor Changes
+ - Deprecated Features
+ - Bugfixes
+- v1\.5\.0
+ - Release Summary
+ - Minor Changes
+ - Deprecated Features
+ - Bugfixes
+- v1\.4\.0
+ - Release Summary
+ - Minor Changes
+ - Bugfixes
+- v1\.3\.0
+ - Release Summary
+ - Minor Changes
+ - Bugfixes
+ - New Modules
+- v1\.2\.0
+ - Release Summary
+ - Minor Changes
+ - Security Fixes
+ - Bugfixes
+- v1\.1\.1
+ - Release Summary
+ - Bugfixes
+- v1\.1\.0
+ - Release Summary
+ - Minor Changes
+ - Bugfixes
+ - New Modules
+- v1\.0\.0
+ - Release Summary
+ - Minor Changes
+ - Deprecated Features
+ - Removed Features \(previously deprecated\)
+ - Bugfixes
+ - New Modules
+
+
+## v2\.19\.0
### Release Summary
@@ -221,16 +228,45 @@ Bugfix and feature release\.
### Minor Changes
-* x509\_crl \- the new option serial\_numbers
allow to configure in which format serial numbers can be provided to revoked\_certificates\[\]\.serial\_number
\. The default is as integers \(serial\_numbers\=integer
\) for backwards compatibility\; setting serial\_numbers\=hex\-octets
allows to specify colon\-separated hex octet strings like 00\:11\:22\:FF
\([https\://github\.com/ansible\-collections/community\.crypto/issues/687](https\://github\.com/ansible\-collections/community\.crypto/issues/687)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/715](https\://github\.com/ansible\-collections/community\.crypto/pull/715)\)\.
+* When using cryptography \>\= 42\.0\.0\, use offset\-aware datetime\.datetime
objects \(with timezone UTC\) instead of offset\-naive UTC timestamps \([https\://github\.com/ansible\-collections/community\.crypto/issues/726](https\://github\.com/ansible\-collections/community\.crypto/issues/726)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/727](https\://github\.com/ansible\-collections/community\.crypto/pull/727)\)\.
+* openssh\_cert \- avoid UTC functions deprecated in Python 3\.12 when using Python 3 \([https\://github\.com/ansible\-collections/community\.crypto/pull/727](https\://github\.com/ansible\-collections/community\.crypto/pull/727)\)\.
### Deprecated Features
-* openssl\_csr\_pipe\, openssl\_privatekey\_pipe\, x509\_certificate\_pipe \- the current behavior of check mode is deprecated and will change in community\.crypto 3\.0\.0\. The current behavior is similar to the modules without \_pipe
\: if the object needs to be \(re\-\)generated\, only the changed
status is set\, but the object is not updated\. From community\.crypto 3\.0\.0 on\, the modules will ignore check mode and always act as if check mode is not active\. This behavior can already achieved now by adding check\_mode\: false
to the task\. If you think this breaks your use\-case of this module\, please [create an issue in the community\.crypto repository](https\://github\.com/ansible\-collections/community\.crypto/issues/new/choose) \([https\://github\.com/ansible\-collections/community\.crypto/issues/712](https\://github\.com/ansible\-collections/community\.crypto/issues/712)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/714](https\://github\.com/ansible\-collections/community\.crypto/pull/714)\)\.
+* acme\.backends module utils \- from community\.crypto on\, all implementations of CryptoBackend
must override get\_ordered\_csr\_identifiers\(\)
\. The current default implementation\, which simply sorts the result of get\_csr\_identifiers\(\)
\, will then be removed \([https\://github\.com/ansible\-collections/community\.crypto/pull/725](https\://github\.com/ansible\-collections/community\.crypto/pull/725)\)\.
### Bugfixes
+* acme\_certificate \- respect the order of the CNAME and SAN identifiers that are passed on when creating an ACME order \([https\://github\.com/ansible\-collections/community\.crypto/issues/723](https\://github\.com/ansible\-collections/community\.crypto/issues/723)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/725](https\://github\.com/ansible\-collections/community\.crypto/pull/725)\)\.
+
+
+### New Modules
+
+* x509\_certificate\_convert \- Convert X\.509 certificates
+
+
+## v2\.18\.0
+
+
+### Release Summary
+
+Bugfix and feature release\.
+
+
+### Minor Changes
+
+* x509\_crl \- the new option serial\_numbers
allow to configure in which format serial numbers can be provided to revoked\_certificates\[\]\.serial\_number
\. The default is as integers \(serial\_numbers\=integer
\) for backwards compatibility\; setting serial\_numbers\=hex\-octets
allows to specify colon\-separated hex octet strings like 00\:11\:22\:FF
\([https\://github\.com/ansible\-collections/community\.crypto/issues/687](https\://github\.com/ansible\-collections/community\.crypto/issues/687)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/715](https\://github\.com/ansible\-collections/community\.crypto/pull/715)\)\.
+
+
+### Deprecated Features
+
+* openssl\_csr\_pipe\, openssl\_privatekey\_pipe\, x509\_certificate\_pipe \- the current behavior of check mode is deprecated and will change in community\.crypto 3\.0\.0\. The current behavior is similar to the modules without \_pipe
\: if the object needs to be \(re\-\)generated\, only the changed
status is set\, but the object is not updated\. From community\.crypto 3\.0\.0 on\, the modules will ignore check mode and always act as if check mode is not active\. This behavior can already achieved now by adding check\_mode\: false
to the task\. If you think this breaks your use\-case of this module\, please [create an issue in the community\.crypto repository](https\://github\.com/ansible\-collections/community\.crypto/issues/new/choose) \([https\://github\.com/ansible\-collections/community\.crypto/issues/712](https\://github\.com/ansible\-collections/community\.crypto/issues/712)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/714](https\://github\.com/ansible\-collections/community\.crypto/pull/714)\)\.
+
+
+### Bugfixes
+
* luks\_device \- fixed module a bug that prevented using remove\_keyslot
with the value 0
\([https\://github\.com/ansible\-collections/community\.crypto/pull/710](https\://github\.com/ansible\-collections/community\.crypto/pull/710)\)\.
* luks\_device \- fixed module falsely outputting changed\=false
when trying to add a new slot with a key that is already present in another slot\. The module now rejects adding keys that are already present in another slot \([https\://github\.com/ansible\-collections/community\.crypto/pull/710](https\://github\.com/ansible\-collections/community\.crypto/pull/710)\)\.
* luks\_device \- fixed testing of LUKS passphrases in when specifying a keyslot for cryptsetup version 2\.0\.3\. The output of this cryptsetup version slightly differs from later versions \([https\://github\.com/ansible\-collections/community\.crypto/pull/710](https\://github\.com/ansible\-collections/community\.crypto/pull/710)\)\.
@@ -247,12 +283,12 @@ Bugfix and feature release\.
## v2\.17\.1
-
+
### Release Summary
Bugfix release for compatibility with cryptography 42\.0\.0\.
-
+
### Bugfixes
* openssl\_dhparam \- was using an internal function instead of the public API to load DH param files when using the cryptography
backend\. The internal function was removed in cryptography 42\.0\.0\. The module now uses the public API\, which has been available since support for DH params was added to cryptography \([https\://github\.com/ansible\-collections/community\.crypto/pull/698](https\://github\.com/ansible\-collections/community\.crypto/pull/698)\)\.
@@ -262,12 +298,12 @@ Bugfix release for compatibility with cryptography 42\.0\.0\.
## v2\.17\.0
-
+
### Release Summary
Feature release\.
-
+
### Minor Changes
* luks\_device \- add allow discards option \([https\://github\.com/ansible\-collections/community\.crypto/pull/693](https\://github\.com/ansible\-collections/community\.crypto/pull/693)\)\.
@@ -275,12 +311,12 @@ Feature release\.
## v2\.16\.2
-
+
### Release Summary
Bugfix release\.
-
+
### Bugfixes
* acme\_\* modules \- directly react on bad return data for account creation/retrieval/updating requests \([https\://github\.com/ansible\-collections/community\.crypto/pull/682](https\://github\.com/ansible\-collections/community\.crypto/pull/682)\)\.
@@ -291,12 +327,12 @@ Bugfix release\.
## v2\.16\.1
-
+
### Release Summary
Bugfix release\.
-
+
### Bugfixes
* acme\_\* modules \- also retry requests in case of socket errors\, bad status lines\, and unknown connection errors\; improve error messages in these cases \([https\://github\.com/ansible\-collections/community\.crypto/issues/680](https\://github\.com/ansible\-collections/community\.crypto/issues/680)\)\.
@@ -304,17 +340,17 @@ Bugfix release\.
## v2\.16\.0
-
+
### Release Summary
Bugfix release\.
-
+
### Minor Changes
* luks\_devices \- add new options keyslot
\, new\_keyslot
\, and remove\_keyslot
to allow adding/removing keys to/from specific keyslots \([https\://github\.com/ansible\-collections/community\.crypto/pull/664](https\://github\.com/ansible\-collections/community\.crypto/pull/664)\)\.
-
+
### Bugfixes
* openssl\_pkcs12 \- modify autodetect to not detect pyOpenSSL \>\= 23\.3\.0\, which removed PKCS\#12 support \([https\://github\.com/ansible\-collections/community\.crypto/pull/666](https\://github\.com/ansible\-collections/community\.crypto/pull/666)\)\.
@@ -322,12 +358,12 @@ Bugfix release\.
## v2\.15\.1
-
+
### Release Summary
Bugfix release\.
-
+
### Bugfixes
* acme\_\* modules \- correctly handle error documents without type
\([https\://github\.com/ansible\-collections/community\.crypto/issues/651](https\://github\.com/ansible\-collections/community\.crypto/issues/651)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/652](https\://github\.com/ansible\-collections/community\.crypto/pull/652)\)\.
@@ -335,22 +371,22 @@ Bugfix release\.
## v2\.15\.0
-
+
### Release Summary
Bugfix and feature release\.
-
+
### Minor Changes
* openssh\_keypair \- fail when comment cannot be updated \([https\://github\.com/ansible\-collections/community\.crypto/pull/646](https\://github\.com/ansible\-collections/community\.crypto/pull/646)\)\.
-
+
### Deprecated Features
* get\_certificate \- the default false
of the asn1\_base64
option is deprecated and will change to true
in community\.crypto 3\.0\.0 \([https\://github\.com/ansible\-collections/community\.crypto/pull/600](https\://github\.com/ansible\-collections/community\.crypto/pull/600)\)\.
-
+
### Bugfixes
* openssh\_cert\, openssh\_keypair \- the modules ignored return codes of ssh
and ssh\-keygen
in some cases \([https\://github\.com/ansible\-collections/community\.crypto/issues/645](https\://github\.com/ansible\-collections/community\.crypto/issues/645)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/646](https\://github\.com/ansible\-collections/community\.crypto/pull/646)\)\.
@@ -372,7 +408,7 @@ Bugfix and feature release\.
## v2\.14\.1
-
+
### Release Summary
Bugfix and maintenance release with updated documentation\.
@@ -385,7 +421,7 @@ ansible\-core 2\.15 or later to see it as it is intended\. Alternatively you can
look at [the devel docsite](https\://docs\.ansible\.com/ansible/devel/collections/community/crypto/)
for the rendered HTML version of the documentation of the latest release\.
-
+
### Bugfixes
* Fix PEM detection/identification to also accept random other lines before the line starting with \-\-\-\-\-BEGIN
\([https\://github\.com/ansible\-collections/community\.crypto/issues/627](https\://github\.com/ansible\-collections/community\.crypto/issues/627)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/628](https\://github\.com/ansible\-collections/community\.crypto/pull/628)\)\.
@@ -398,12 +434,12 @@ for the rendered HTML version of the documentation of the latest release\.
## v2\.14\.0
-
+
### Release Summary
Feature release\.
-
+
### Minor Changes
* acme\_certificate \- allow to use no challenge by providing no challenge
for the challenge
option\. This is needed for ACME servers where validation is done without challenges \([https\://github\.com/ansible\-collections/community\.crypto/issues/613](https\://github\.com/ansible\-collections/community\.crypto/issues/613)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/615](https\://github\.com/ansible\-collections/community\.crypto/pull/615)\)\.
@@ -413,12 +449,12 @@ Feature release\.
## v2\.13\.1
-
+
### Release Summary
Bugfix release\.
-
+
### Bugfixes
* execution environment definition \- fix installation of python3\-pyOpenSSL
package on CentOS and RHEL \([https\://github\.com/ansible\-collections/community\.crypto/pull/606](https\://github\.com/ansible\-collections/community\.crypto/pull/606)\)\.
@@ -427,22 +463,22 @@ Bugfix release\.
## v2\.13\.0
-
+
### Release Summary
Bugfix and maintenance release\.
-
+
### Minor Changes
* x509\_crl \- the crl\_mode
option has been added to replace the existing mode
option \([https\://github\.com/ansible\-collections/community\.crypto/issues/596](https\://github\.com/ansible\-collections/community\.crypto/issues/596)\)\.
-
+
### Deprecated Features
* x509\_crl \- the mode
option is deprecated\; use crl\_mode
instead\. The mode
option will change its meaning in community\.crypto 3\.0\.0\, and will refer to the CRL file\'s mode instead \([https\://github\.com/ansible\-collections/community\.crypto/issues/596](https\://github\.com/ansible\-collections/community\.crypto/issues/596)\)\.
-
+
### Bugfixes
* openssh\_keypair \- always generate a new key pair if the private key does not exist\. Previously\, the module would fail when regenerate\=fail
without an existing key\, contradicting the documentation \([https\://github\.com/ansible\-collections/community\.crypto/pull/598](https\://github\.com/ansible\-collections/community\.crypto/pull/598)\)\.
@@ -451,12 +487,12 @@ Bugfix and maintenance release\.
## v2\.12\.0
-
+
### Release Summary
Feature release\.
-
+
### Minor Changes
* get\_certificate \- add asn1\_base64
option to control whether the ASN\.1 included in the extensions
return value is binary data or Base64 encoded \([https\://github\.com/ansible\-collections/community\.crypto/pull/592](https\://github\.com/ansible\-collections/community\.crypto/pull/592)\)\.
@@ -464,7 +500,7 @@ Feature release\.
## v2\.11\.1
-
+
### Release Summary
Maintenance release with improved documentation\.
@@ -472,17 +508,17 @@ Maintenance release with improved documentation\.
## v2\.11\.0
-
+
### Release Summary
Feature and bugfix release\.
-
+
### Minor Changes
* get\_certificate \- adds ciphers
option for custom cipher selection \([https\://github\.com/ansible\-collections/community\.crypto/pull/571](https\://github\.com/ansible\-collections/community\.crypto/pull/571)\)\.
-
+
### Bugfixes
* action plugin helper \- fix handling of deprecations for ansible\-core 2\.14\.2 \([https\://github\.com/ansible\-collections/community\.crypto/pull/572](https\://github\.com/ansible\-collections/community\.crypto/pull/572)\)\.
@@ -492,12 +528,12 @@ Feature and bugfix release\.
## v2\.10\.0
-
+
### Release Summary
Bugfix and feature release\.
-
+
### Bugfixes
* openssl\_csr\, openssl\_csr\_pipe \- prevent invalid values for crl\_distribution\_points
that do not have one of full\_name
\, relative\_name
\, and crl\_issuer
\([https\://github\.com/ansible\-collections/community\.crypto/pull/560](https\://github\.com/ansible\-collections/community\.crypto/pull/560)\)\.
@@ -519,12 +555,12 @@ Bugfix and feature release\.
## v2\.9\.0
-
+
### Release Summary
Regular feature release\.
-
+
### Minor Changes
* x509\_certificate\_info \- adds issuer\_uri
field in return value based on Authority Information Access data \([https\://github\.com/ansible\-collections/community\.crypto/pull/530](https\://github\.com/ansible\-collections/community\.crypto/pull/530)\)\.
@@ -532,7 +568,7 @@ Regular feature release\.
## v2\.8\.1
-
+
### Release Summary
Maintenance release with improved documentation\.
@@ -540,12 +576,12 @@ Maintenance release with improved documentation\.
## v2\.8\.0
-
+
### Release Summary
Feature release\.
-
+
### Minor Changes
* acme\_\* modules \- handle more gracefully if CA\'s new nonce call does not return a nonce \([https\://github\.com/ansible\-collections/community\.crypto/pull/525](https\://github\.com/ansible\-collections/community\.crypto/pull/525)\)\.
@@ -555,12 +591,12 @@ Feature release\.
## v2\.7\.1
-
+
### Release Summary
Maintenance release\.
-
+
### Bugfixes
* acme\_\* modules \- improve feedback when importing cryptography
does not work \([https\://github\.com/ansible\-collections/community\.crypto/issues/518](https\://github\.com/ansible\-collections/community\.crypto/issues/518)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/519](https\://github\.com/ansible\-collections/community\.crypto/pull/519)\)\.
@@ -568,24 +604,6 @@ Maintenance release\.
## v2\.7\.0
-
-### Release Summary
-
-Feature release\.
-
-
-### Minor Changes
-
-* acme\* modules \- also support the HTTP 503 Service Unavailable and 408 Request Timeout response status for automatic retries \([https\://github\.com/ansible\-collections/community\.crypto/pull/513](https\://github\.com/ansible\-collections/community\.crypto/pull/513)\)\.
-
-
-### Bugfixes
-
-* openssl\_privatekey\_pipe \- ensure compatibility with newer versions of ansible\-core \([https\://github\.com/ansible\-collections/community\.crypto/pull/515](https\://github\.com/ansible\-collections/community\.crypto/pull/515)\)\.
-
-
-## v2\.6\.0
-
### Release Summary
@@ -594,18 +612,36 @@ Feature release\.
### Minor Changes
+* acme\* modules \- also support the HTTP 503 Service Unavailable and 408 Request Timeout response status for automatic retries \([https\://github\.com/ansible\-collections/community\.crypto/pull/513](https\://github\.com/ansible\-collections/community\.crypto/pull/513)\)\.
+
+
+### Bugfixes
+
+* openssl\_privatekey\_pipe \- ensure compatibility with newer versions of ansible\-core \([https\://github\.com/ansible\-collections/community\.crypto/pull/515](https\://github\.com/ansible\-collections/community\.crypto/pull/515)\)\.
+
+
+## v2\.6\.0
+
+
+### Release Summary
+
+Feature release\.
+
+
+### Minor Changes
+
* acme\* modules \- support the HTTP 429 Too Many Requests response status \([https\://github\.com/ansible\-collections/community\.crypto/pull/508](https\://github\.com/ansible\-collections/community\.crypto/pull/508)\)\.
* openssh\_keypair \- added pkcs1
\, pkcs8
\, and ssh
to the available choices for the private\_key\_format
option \([https\://github\.com/ansible\-collections/community\.crypto/pull/511](https\://github\.com/ansible\-collections/community\.crypto/pull/511)\)\.
## v2\.5\.0
-
+
### Release Summary
Maintenance release with improved licensing declaration and documentation fixes\.
-
+
### Minor Changes
* All software licenses are now in the LICENSES/
directory of the collection root\. Moreover\, SPDX\-License\-Identifier\:
is used to declare the applicable license for every file that is not automatically generated \([https\://github\.com/ansible\-collections/community\.crypto/pull/491](https\://github\.com/ansible\-collections/community\.crypto/pull/491)\)\.
@@ -613,17 +649,17 @@ Maintenance release with improved licensing declaration and documentation fixes\
## v2\.4\.0
-
+
### Release Summary
Deprecation and bugfix release\. No new features this time\.
-
+
### Deprecated Features
* Support for Ansible 2\.9 and ansible\-base 2\.10 is deprecated\, and will be removed in the next major release \(community\.crypto 3\.0\.0\)\. Some modules might still work with these versions afterwards\, but we will no longer keep compatibility code that was needed to support them \([https\://github\.com/ansible\-collections/community\.crypto/pull/460](https\://github\.com/ansible\-collections/community\.crypto/pull/460)\)\.
-
+
### Bugfixes
* openssl\_pkcs12 \- when using the pyOpenSSL backend\, do not crash when trying to read non\-existing other certificates \([https\://github\.com/ansible\-collections/community\.crypto/issues/486](https\://github\.com/ansible\-collections/community\.crypto/issues/486)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/487](https\://github\.com/ansible\-collections/community\.crypto/pull/487)\)\.
@@ -631,7 +667,7 @@ Deprecation and bugfix release\. No new features this time\.
## v2\.3\.4
-
+
### Release Summary
Re\-release of what was intended to be 2\.3\.3\.
@@ -647,12 +683,12 @@ has been added\.
## v2\.3\.3
-
+
### Release Summary
Bugfix release\.
-
+
### Bugfixes
* Include Apache\-2\.0\.txt
file for plugins/module\_utils/crypto/\_obj2txt\.py
and plugins/module\_utils/crypto/\_objects\_data\.py
\.
@@ -662,12 +698,12 @@ Bugfix release\.
## v2\.3\.2
-
+
### Release Summary
Maintenance and bugfix release\.
-
+
### Bugfixes
* Include simplified\_bsd\.txt
license file for the ECS module utils\.
@@ -676,12 +712,12 @@ Maintenance and bugfix release\.
## v2\.3\.1
-
+
### Release Summary
Maintenance release\.
-
+
### Bugfixes
* Include PSF\-license\.txt
file for plugins/module\_utils/\_version\.py
\.
@@ -689,12 +725,12 @@ Maintenance release\.
## v2\.3\.0
-
+
### Release Summary
Feature and bugfix release\.
-
+
### Minor Changes
* Prepare collection for inclusion in an Execution Environment by declaring its dependencies\. Please note that system packages are used for cryptography and PyOpenSSL\, which can be rather limited\. If you need features from newer cryptography versions\, you will have to manually force a newer version to be installed by pip by specifying something like cryptography \>\= 37\.0\.0
in your Execution Environment\'s Python dependencies file \([https\://github\.com/ansible\-collections/community\.crypto/pull/440](https\://github\.com/ansible\-collections/community\.crypto/pull/440)\)\.
@@ -708,7 +744,7 @@ Feature and bugfix release\.
* x509\_crl \- add name\_encoding
option to control the encoding \(IDNA\, Unicode\) used to return domain names in general names \([https\://github\.com/ansible\-collections/community\.crypto/pull/436](https\://github\.com/ansible\-collections/community\.crypto/pull/436)\)\.
* x509\_crl\_info \- add name\_encoding
option to control the encoding \(IDNA\, Unicode\) used to return domain names in general names \([https\://github\.com/ansible\-collections/community\.crypto/pull/436](https\://github\.com/ansible\-collections/community\.crypto/pull/436)\)\.
-
+
### Bugfixes
* Make collection more robust when PyOpenSSL is used with an incompatible cryptography version \([https\://github\.com/ansible\-collections/community\.crypto/pull/445](https\://github\.com/ansible\-collections/community\.crypto/pull/445)\)\.
@@ -717,12 +753,12 @@ Feature and bugfix release\.
## v2\.2\.4
-
+
### Release Summary
Regular maintenance release\.
-
+
### Bugfixes
* openssh\_\* modules \- fix exception handling to report traceback to users for enhanced traceability \([https\://github\.com/ansible\-collections/community\.crypto/pull/417](https\://github\.com/ansible\-collections/community\.crypto/pull/417)\)\.
@@ -730,12 +766,12 @@ Regular maintenance release\.
## v2\.2\.3
-
+
### Release Summary
Regular bugfix release\.
-
+
### Bugfixes
* luks\_device \- fix parsing of lsblk
output when device name ends with crypt
\([https\://github\.com/ansible\-collections/community\.crypto/issues/409](https\://github\.com/ansible\-collections/community\.crypto/issues/409)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/410](https\://github\.com/ansible\-collections/community\.crypto/pull/410)\)\.
@@ -743,14 +779,14 @@ Regular bugfix release\.
## v2\.2\.2
-
+
### Release Summary
Regular bugfix release\.
In this release\, we extended the test matrix to include Alpine 3\, ArchLinux\, Debian Bullseye\, and CentOS Stream 8\. CentOS 8 was removed from the test matrix\.
-
+
### Bugfixes
* certificate\_complete\_chain \- allow multiple potential intermediate certificates to have the same subject \([https\://github\.com/ansible\-collections/community\.crypto/issues/399](https\://github\.com/ansible\-collections/community\.crypto/issues/399)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/403](https\://github\.com/ansible\-collections/community\.crypto/pull/403)\)\.
@@ -762,12 +798,12 @@ In this release\, we extended the test matrix to include Alpine 3\, ArchLinux\,
## v2\.2\.1
-
+
### Release Summary
Bugfix release\.
-
+
### Bugfixes
* openssh\_cert \- fixed false changed
status for host
certificates when using full\_idempotence
\([https\://github\.com/ansible\-collections/community\.crypto/issues/395](https\://github\.com/ansible\-collections/community\.crypto/issues/395)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/396](https\://github\.com/ansible\-collections/community\.crypto/pull/396)\)\.
@@ -775,17 +811,17 @@ Bugfix release\.
## v2\.2\.0
-
+
### Release Summary
Regular bugfix and feature release\.
-
+
### Minor Changes
* openssh\_cert \- added ignore\_timestamps
parameter so it can be used semi\-idempotent with relative timestamps in valid\_to
/valid\_from
\([https\://github\.com/ansible\-collections/community\.crypto/issues/379](https\://github\.com/ansible\-collections/community\.crypto/issues/379)\)\.
-
+
### Bugfixes
* luks\_devices \- set LANG
and similar environment variables to avoid translated output\, which can break some of the module\'s functionality like key management \([https\://github\.com/ansible\-collections/community\.crypto/pull/388](https\://github\.com/ansible\-collections/community\.crypto/pull/388)\, [https\://github\.com/ansible\-collections/community\.crypto/issues/385](https\://github\.com/ansible\-collections/community\.crypto/issues/385)\)\.
@@ -793,24 +829,24 @@ Regular bugfix and feature release\.
## v2\.1\.0
-
+
### Release Summary
Feature and bugfix release\.
-
+
### Minor Changes
* Adjust error messages that indicate cryptography
is not installed from Can\'t
to Cannot
\([https\://github\.com/ansible\-collections/community\.crypto/pull/374](https\://github\.com/ansible\-collections/community\.crypto/pull/374)\)\.
-
+
### Bugfixes
* Various modules and plugins \- use vendored version of distutils\.version
instead of the deprecated Python standard library distutils
\([https\://github\.com/ansible\-collections/community\.crypto/pull/353](https\://github\.com/ansible\-collections/community\.crypto/pull/353)\)\.
* certificate\_complete\_chain \- do not append root twice if the chain already ends with a root certificate \([https\://github\.com/ansible\-collections/community\.crypto/pull/360](https\://github\.com/ansible\-collections/community\.crypto/pull/360)\)\.
* certificate\_complete\_chain \- do not hang when infinite loop is found \([https\://github\.com/ansible\-collections/community\.crypto/issues/355](https\://github\.com/ansible\-collections/community\.crypto/issues/355)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/360](https\://github\.com/ansible\-collections/community\.crypto/pull/360)\)\.
-
+
### New Modules
* crypto\_info \- Retrieve cryptographic capabilities
@@ -819,7 +855,7 @@ Feature and bugfix release\.
## v2\.0\.2
-
+
### Release Summary
Documentation fix release\. No actual code changes\.
@@ -827,17 +863,17 @@ Documentation fix release\. No actual code changes\.
## v2\.0\.1
-
+
### Release Summary
Bugfix release with extra forward compatibility for newer versions of cryptography\.
-
+
### Minor Changes
* acme\_\* modules \- fix usage of fetch\_url
with changes in latest ansible\-core devel
branch \([https\://github\.com/ansible\-collections/community\.crypto/pull/339](https\://github\.com/ansible\-collections/community\.crypto/pull/339)\)\.
-
+
### Bugfixes
* acme\_certificate \- avoid passing multiple certificates to cryptography
\'s X\.509 certificate loader when fullchain\_dest
is used \([https\://github\.com/ansible\-collections/community\.crypto/pull/324](https\://github\.com/ansible\-collections/community\.crypto/pull/324)\)\.
@@ -848,12 +884,12 @@ Bugfix release with extra forward compatibility for newer versions of cryptograp
## v2\.0\.0
-
+
### Release Summary
A new major release of the community\.crypto
collection\. The main changes are removal of the PyOpenSSL backends for almost all modules \(openssl\_pkcs12
being the only exception\)\, and removal of the assertonly
provider in the x509\_certificate
provider\. There are also some other breaking changes which should improve the user interface/experience of this collection long\-term\.
-
+
### Minor Changes
* acme\_certificate \- the subject
and issuer
fields in in the select\_chain
entries are now more strictly validated \([https\://github\.com/ansible\-collections/community\.crypto/pull/316](https\://github\.com/ansible\-collections/community\.crypto/pull/316)\)\.
@@ -878,7 +914,7 @@ A new major release of the community\.crypto
collection\. The main
* openssl\_privatekey\_info \- by default consistency checks are not run\; they need to be explicitly requested by passing check\_consistency\=true
\([https\://github\.com/ansible\-collections/community\.crypto/pull/309](https\://github\.com/ansible\-collections/community\.crypto/pull/309)\)\.
* x509\_crl \- for idempotency checks\, the issuer
order is ignored\. If order is important\, use the new issuer\_ordered
option \([https\://github\.com/ansible\-collections/community\.crypto/pull/316](https\://github\.com/ansible\-collections/community\.crypto/pull/316)\)\.
-
+
### Deprecated Features
* acme\_\* modules \- ACME version 1 is now deprecated and support for it will be removed in community\.crypto 2\.0\.0 \([https\://github\.com/ansible\-collections/community\.crypto/pull/288](https\://github\.com/ansible\-collections/community\.crypto/pull/288)\)\.
@@ -910,7 +946,7 @@ A new major release of the community\.crypto
collection\. The main
* x509\_certificate\_info \- removed the pyopenssl
backend \([https\://github\.com/ansible\-collections/community\.crypto/pull/273](https\://github\.com/ansible\-collections/community\.crypto/pull/273)\)\.
* x509\_certificate\_pipe \- removed the pyopenssl
backend \([https\://github\.com/ansible\-collections/community\.crypto/pull/273](https\://github\.com/ansible\-collections/community\.crypto/pull/273)\)\.
-
+
### Bugfixes
* cryptography backend \- improve Unicode handling for Python 2 \([https\://github\.com/ansible\-collections/community\.crypto/pull/313](https\://github\.com/ansible\-collections/community\.crypto/pull/313)\)\.
@@ -922,20 +958,6 @@ A new major release of the community\.crypto
collection\. The main
## v1\.9\.4
-
-### Release Summary
-
-Regular bugfix release\.
-
-
-### Bugfixes
-
-* acme\_\* modules \- fix commands composed for OpenSSL backend to retrieve information on CSRs and certificates from stdin to use /dev/stdin
instead of \-
\. This is needed for OpenSSL 1\.0\.1 and 1\.0\.2\, apparently \([https\://github\.com/ansible\-collections/community\.crypto/pull/279](https\://github\.com/ansible\-collections/community\.crypto/pull/279)\)\.
-* acme\_challenge\_cert\_helper \- only return exception when cryptography is not installed\, not when a too old version of it is installed\. This prevents Ansible\'s callback to crash \([https\://github\.com/ansible\-collections/community\.crypto/pull/281](https\://github\.com/ansible\-collections/community\.crypto/pull/281)\)\.
-
-
-## v1\.9\.3
-
### Release Summary
@@ -944,12 +966,26 @@ Regular bugfix release\.
### Bugfixes
+* acme\_\* modules \- fix commands composed for OpenSSL backend to retrieve information on CSRs and certificates from stdin to use /dev/stdin
instead of \-
\. This is needed for OpenSSL 1\.0\.1 and 1\.0\.2\, apparently \([https\://github\.com/ansible\-collections/community\.crypto/pull/279](https\://github\.com/ansible\-collections/community\.crypto/pull/279)\)\.
+* acme\_challenge\_cert\_helper \- only return exception when cryptography is not installed\, not when a too old version of it is installed\. This prevents Ansible\'s callback to crash \([https\://github\.com/ansible\-collections/community\.crypto/pull/281](https\://github\.com/ansible\-collections/community\.crypto/pull/281)\)\.
+
+
+## v1\.9\.3
+
+
+### Release Summary
+
+Regular bugfix release\.
+
+
+### Bugfixes
+
* openssl\_csr and openssl\_csr\_pipe \- make sure that Unicode strings are used to compare strings with the cryptography backend\. This fixes idempotency problems with non\-ASCII letters on Python 2 \([https\://github\.com/ansible\-collections/community\.crypto/issues/270](https\://github\.com/ansible\-collections/community\.crypto/issues/270)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/271](https\://github\.com/ansible\-collections/community\.crypto/pull/271)\)\.
## v1\.9\.2
-
+
### Release Summary
Bugfix release to fix the changelog\. No other change compared to 1\.9\.0\.
@@ -957,7 +993,7 @@ Bugfix release to fix the changelog\. No other change compared to 1\.9\.0\.
## v1\.9\.1
-
+
### Release Summary
Accidental 1\.9\.1 release\. Identical to 1\.9\.0\.
@@ -965,18 +1001,18 @@ Accidental 1\.9\.1 release\. Identical to 1\.9\.0\.
## v1\.9\.0
-
+
### Release Summary
Regular feature release\.
-
+
### Minor Changes
* get\_certificate \- added starttls
option to retrieve certificates from servers which require clients to request an encrypted connection \([https\://github\.com/ansible\-collections/community\.crypto/pull/264](https\://github\.com/ansible\-collections/community\.crypto/pull/264)\)\.
* openssh\_keypair \- added diff
support \([https\://github\.com/ansible\-collections/community\.crypto/pull/260](https\://github\.com/ansible\-collections/community\.crypto/pull/260)\)\.
-
+
### Bugfixes
* keypair\_backend module utils \- simplify code to pass sanity tests \([https\://github\.com/ansible\-collections/community\.crypto/pull/263](https\://github\.com/ansible\-collections/community\.crypto/pull/263)\)\.
@@ -987,12 +1023,12 @@ Regular feature release\.
## v1\.8\.0
-
+
### Release Summary
Regular bugfix and feature release\.
-
+
### Minor Changes
* Avoid internal ansible\-core module\_utils in favor of equivalent public API available since at least Ansible 2\.9 \([https\://github\.com/ansible\-collections/community\.crypto/pull/253](https\://github\.com/ansible\-collections/community\.crypto/pull/253)\)\.
@@ -1000,7 +1036,7 @@ Regular bugfix and feature release\.
* openssh\_cert \- added regenerate
option to validate additional certificate parameters which trigger regeneration of an existing certificate \([https\://github\.com/ansible\-collections/community\.crypto/pull/256](https\://github\.com/ansible\-collections/community\.crypto/pull/256)\)\.
* openssh\_cert \- adding diff
support \([https\://github\.com/ansible\-collections/community\.crypto/pull/255](https\://github\.com/ansible\-collections/community\.crypto/pull/255)\)\.
-
+
### Bugfixes
* openssh\_cert \- fixed certificate generation to restore original certificate if an error is encountered \([https\://github\.com/ansible\-collections/community\.crypto/pull/255](https\://github\.com/ansible\-collections/community\.crypto/pull/255)\)\.
@@ -1009,12 +1045,12 @@ Regular bugfix and feature release\.
## v1\.7\.1
-
+
### Release Summary
Bugfix release\.
-
+
### Bugfixes
* openssl\_pkcs12 \- fix crash when loading passphrase\-protected PKCS\#12 files with cryptography
backend \([https\://github\.com/ansible\-collections/community\.crypto/issues/247](https\://github\.com/ansible\-collections/community\.crypto/issues/247)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/248](https\://github\.com/ansible\-collections/community\.crypto/pull/248)\)\.
@@ -1022,12 +1058,12 @@ Bugfix release\.
## v1\.7\.0
-
+
### Release Summary
Regular feature and bugfix release\.
-
+
### Minor Changes
* cryptography\_openssh module utils \- new module\_utils for managing asymmetric keypairs and OpenSSH formatted/encoded asymmetric keypairs \([https\://github\.com/ansible\-collections/community\.crypto/pull/213](https\://github\.com/ansible\-collections/community\.crypto/pull/213)\)\.
@@ -1050,14 +1086,14 @@ Regular feature and bugfix release\.
* x509\_crl\_info \- add list\_revoked\_certificates
option to avoid enumerating all revoked certificates \([https\://github\.com/ansible\-collections/community\.crypto/pull/232](https\://github\.com/ansible\-collections/community\.crypto/pull/232)\)\.
* x509\_crl\_info \- refactor module to allow code reuse for diff mode \([https\://github\.com/ansible\-collections/community\.crypto/pull/203](https\://github\.com/ansible\-collections/community\.crypto/pull/203)\)\.
-
+
### Bugfixes
* openssh\_keypair \- fix check\_mode
to populate return values for existing keypairs \([https\://github\.com/ansible\-collections/community\.crypto/issues/113](https\://github\.com/ansible\-collections/community\.crypto/issues/113)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/230](https\://github\.com/ansible\-collections/community\.crypto/pull/230)\)\.
* various modules \- prevent crashes when modules try to set attributes on not yet existing files in check mode\. This will be fixed in ansible\-core 2\.12\, but it is not backported to every Ansible version we support \([https\://github\.com/ansible\-collections/community\.crypto/issue/242](https\://github\.com/ansible\-collections/community\.crypto/issue/242)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/243](https\://github\.com/ansible\-collections/community\.crypto/pull/243)\)\.
* x509\_certificate \- fix crash when assertonly
provider is used and some error conditions should be reported \([https\://github\.com/ansible\-collections/community\.crypto/issues/240](https\://github\.com/ansible\-collections/community\.crypto/issues/240)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/241](https\://github\.com/ansible\-collections/community\.crypto/pull/241)\)\.
-
+
### New Modules
* openssl\_publickey\_info \- Provide information for OpenSSL public keys
@@ -1065,12 +1101,12 @@ Regular feature and bugfix release\.
## v1\.6\.2
-
+
### Release Summary
Bugfix release\. Fixes compatibility issue of ACME modules with step\-ca\.
-
+
### Bugfixes
* acme\_\* modules \- avoid crashing for ACME servers where the meta
directory key is not present \([https\://github\.com/ansible\-collections/community\.crypto/issues/220](https\://github\.com/ansible\-collections/community\.crypto/issues/220)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/221](https\://github\.com/ansible\-collections/community\.crypto/pull/221)\)\.
@@ -1078,12 +1114,12 @@ Bugfix release\. Fixes compatibility issue of ACME modules with step\-ca\.
## v1\.6\.1
-
+
### Release Summary
Bugfix release\.
-
+
### Bugfixes
* acme\_\* modules \- fix wrong usages of ACMEProtocolException
\([https\://github\.com/ansible\-collections/community\.crypto/pull/216](https\://github\.com/ansible\-collections/community\.crypto/pull/216)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/217](https\://github\.com/ansible\-collections/community\.crypto/pull/217)\)\.
@@ -1091,12 +1127,12 @@ Bugfix release\.
## v1\.6\.0
-
+
### Release Summary
Fixes compatibility issues with the latest ansible\-core 2\.11 beta\, and contains a lot of internal refactoring for the ACME modules and support for private key passphrases for them\.
-
+
### Minor Changes
* acme module\_utils \- the acme
module\_utils has been split up into several Python modules \([https\://github\.com/ansible\-collections/community\.crypto/pull/184](https\://github\.com/ansible\-collections/community\.crypto/pull/184)\)\.
@@ -1105,12 +1141,12 @@ Fixes compatibility issues with the latest ansible\-core 2\.11 beta\, and contai
* acme\_certificate\_revoke \- support revoking by private keys that are passphrase protected for cryptography
backend \([https\://github\.com/ansible\-collections/community\.crypto/pull/207](https\://github\.com/ansible\-collections/community\.crypto/pull/207)\)\.
* acme\_challenge\_cert\_helper \- add private\_key\_passphrase
parameter \([https\://github\.com/ansible\-collections/community\.crypto/pull/207](https\://github\.com/ansible\-collections/community\.crypto/pull/207)\)\.
-
+
### Deprecated Features
* acme module\_utils \- the acme
module\_utils \(ansible\_collections\.community\.crypto\.plugins\.module\_utils\.acme
\) is deprecated and will be removed in community\.crypto 2\.0\.0\. Use the new Python modules in the acme
package instead \(ansible\_collections\.community\.crypto\.plugins\.module\_utils\.acme\.xxx
\) \([https\://github\.com/ansible\-collections/community\.crypto/pull/184](https\://github\.com/ansible\-collections/community\.crypto/pull/184)\)\.
-
+
### Bugfixes
* action\_module plugin helper \- make compatible with latest changes in ansible\-core 2\.11\.0b3 \([https\://github\.com/ansible\-collections/community\.crypto/pull/202](https\://github\.com/ansible\-collections/community\.crypto/pull/202)\)\.
@@ -1119,23 +1155,23 @@ Fixes compatibility issues with the latest ansible\-core 2\.11 beta\, and contai
## v1\.5\.0
-
+
### Release Summary
Regular feature and bugfix release\. Deprecates a return value\.
-
+
### Minor Changes
* acme\_account\_info \- when retrieve\_orders
is not ignore
and the ACME server allows to query orders\, the new return value order\_uris
is always populated with a list of URIs \([https\://github\.com/ansible\-collections/community\.crypto/pull/178](https\://github\.com/ansible\-collections/community\.crypto/pull/178)\)\.
* luks\_device \- allow to specify sector size for LUKS2 containers with new sector\_size
parameter \([https\://github\.com/ansible\-collections/community\.crypto/pull/193](https\://github\.com/ansible\-collections/community\.crypto/pull/193)\)\.
-
+
### Deprecated Features
* acme\_account\_info \- when retrieve\_orders\=url\_list
\, orders
will no longer be returned in community\.crypto 2\.0\.0\. Use order\_uris
instead \([https\://github\.com/ansible\-collections/community\.crypto/pull/178](https\://github\.com/ansible\-collections/community\.crypto/pull/178)\)\.
-
+
### Bugfixes
* openssl\_csr \- no longer fails when comparing CSR without basic constraint when basic\_constraints
is specified \([https\://github\.com/ansible\-collections/community\.crypto/issues/179](https\://github\.com/ansible\-collections/community\.crypto/issues/179)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/180](https\://github\.com/ansible\-collections/community\.crypto/pull/180)\)\.
@@ -1143,12 +1179,12 @@ Regular feature and bugfix release\. Deprecates a return value\.
## v1\.4\.0
-
+
### Release Summary
Release with several new features and bugfixes\.
-
+
### Minor Changes
* The ACME module\_utils has been relicensed back from the Simplified BSD License \([https\://opensource\.org/licenses/BSD\-2\-Clause](https\://opensource\.org/licenses/BSD\-2\-Clause)\) to the GPLv3\+ \(same license used by most other code in this collection\)\. This undoes a licensing change when the original GPLv3\+ licensed code was moved to module\_utils in [https\://github\.com/ansible/ansible/pull/40697](https\://github\.com/ansible/ansible/pull/40697) \([https\://github\.com/ansible\-collections/community\.crypto/pull/165](https\://github\.com/ansible\-collections/community\.crypto/pull/165)\)\.
@@ -1158,7 +1194,7 @@ Release with several new features and bugfixes\.
* openssl\_csr\, openssl\_csr\_pipe \- allow to specify CRL distribution endpoints with crl\_distribution\_points
\([https\://github\.com/ansible\-collections/community\.crypto/issues/147](https\://github\.com/ansible\-collections/community\.crypto/issues/147)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/167](https\://github\.com/ansible\-collections/community\.crypto/pull/167)\)\.
* openssl\_pkcs12 \- allow to specify certificate bundles in other\_certificates
by using new option other\_certificates\_parse\_all
\([https\://github\.com/ansible\-collections/community\.crypto/issues/149](https\://github\.com/ansible\-collections/community\.crypto/issues/149)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/166](https\://github\.com/ansible\-collections/community\.crypto/pull/166)\)\.
-
+
### Bugfixes
* acme\_certificate \- error when requested challenge type is not found for non\-valid challenges\, instead of hanging on step 2 \([https\://github\.com/ansible\-collections/community\.crypto/issues/171](https\://github\.com/ansible\-collections/community\.crypto/issues/171)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/173](https\://github\.com/ansible\-collections/community\.crypto/pull/173)\)\.
@@ -1166,12 +1202,12 @@ Release with several new features and bugfixes\.
## v1\.3\.0
-
+
### Release Summary
Contains new modules openssl\_privatekey\_pipe
\, openssl\_csr\_pipe
and x509\_certificate\_pipe
which allow to create or update private keys\, CSRs and X\.509 certificates without having to write them to disk\.
-
+
### Minor Changes
* openssh\_cert \- add module parameter use\_agent
to enable using signing keys stored in ssh\-agent \([https\://github\.com/ansible\-collections/community\.crypto/issues/116](https\://github\.com/ansible\-collections/community\.crypto/issues/116)\)\.
@@ -1181,14 +1217,14 @@ Contains new modules openssl\_privatekey\_pipe
\, openssl\_csr
* x509\_certificate \- for the selfsigned
provider\, a CSR is not required anymore\. If no CSR is provided\, the module behaves as if a minimal CSR which only contains the public key has been provided \([https\://github\.com/ansible\-collections/community\.crypto/issues/32](https\://github\.com/ansible\-collections/community\.crypto/issues/32)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/129](https\://github\.com/ansible\-collections/community\.crypto/pull/129)\)\.
* x509\_certificate \- refactor module to allow code reuse by x509\_certificate\_pipe \([https\://github\.com/ansible\-collections/community\.crypto/pull/135](https\://github\.com/ansible\-collections/community\.crypto/pull/135)\)\.
-
+
### Bugfixes
* openssl\_pkcs12 \- report the correct state when action
is parse
\([https\://github\.com/ansible\-collections/community\.crypto/issues/143](https\://github\.com/ansible\-collections/community\.crypto/issues/143)\)\.
* support code \- improve handling of certificate and certificate signing request \(CSR\) loading with the cryptography
backend when errors occur \([https\://github\.com/ansible\-collections/community\.crypto/issues/138](https\://github\.com/ansible\-collections/community\.crypto/issues/138)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/139](https\://github\.com/ansible\-collections/community\.crypto/pull/139)\)\.
* x509\_certificate \- fix entrust
provider\, which was broken since community\.crypto 0\.1\.0 due to a feature added before the collection move \([https\://github\.com/ansible\-collections/community\.crypto/pull/135](https\://github\.com/ansible\-collections/community\.crypto/pull/135)\)\.
-
+
### New Modules
* openssl\_csr\_pipe \- Generate OpenSSL Certificate Signing Request \(CSR\)
@@ -1198,12 +1234,12 @@ Contains new modules openssl\_privatekey\_pipe
\, openssl\_csr
## v1\.2\.0
-
+
### Release Summary
Please note that this release fixes a security issue \(CVE\-2020\-25646\)\.
-
+
### Minor Changes
* acme\_certificate \- allow to pass CSR file as content with new option csr\_content
\([https\://github\.com/ansible\-collections/community\.crypto/pull/115](https\://github\.com/ansible\-collections/community\.crypto/pull/115)\)\.
@@ -1219,7 +1255,7 @@ Please note that this release fixes a security issue \(CVE\-2020\-25646\)\.
* x509\_certificate \- the options privatekey\_content
and ownca\_privatekey\_content
were not marked as no\_log
\, resulting in it being dumped into the system log by default\, and returned in the registered results in the invocation
field \(CVE\-2020\-25646\, [https\://github\.com/ansible\-collections/community\.crypto/pull/125](https\://github\.com/ansible\-collections/community\.crypto/pull/125)\)\.
* x509\_crl \- the option privatekey\_content
was not marked as no\_log
\, resulting in it being dumped into the system log by default\, and returned in the registered results in the invocation
field \(CVE\-2020\-25646\, [https\://github\.com/ansible\-collections/community\.crypto/pull/125](https\://github\.com/ansible\-collections/community\.crypto/pull/125)\)\.
-
+
### Bugfixes
* openssl\_pkcs12 \- do not crash when reading PKCS\#12 file which has no private key and/or no main certificate \([https\://github\.com/ansible\-collections/community\.crypto/issues/103](https\://github\.com/ansible\-collections/community\.crypto/issues/103)\)\.
@@ -1227,12 +1263,12 @@ Please note that this release fixes a security issue \(CVE\-2020\-25646\)\.
## v1\.1\.1
-
+
### Release Summary
Bugfixes for Ansible 2\.10\.0\.
-
+
### Bugfixes
* meta/runtime\.yml \- convert Ansible version numbers for old names of modules to collection version numbers \([https\://github\.com/ansible\-collections/community\.crypto/pull/108](https\://github\.com/ansible\-collections/community\.crypto/pull/108)\)\.
@@ -1241,12 +1277,12 @@ Bugfixes for Ansible 2\.10\.0\.
## v1\.1\.0
-
+
### Release Summary
Release for Ansible 2\.10\.0\.
-
+
### Minor Changes
* acme\_account \- add external\_account\_binding
option to allow creation of ACME accounts with External Account Binding \([https\://github\.com/ansible\-collections/community\.crypto/issues/89](https\://github\.com/ansible\-collections/community\.crypto/issues/89)\)\.
@@ -1259,14 +1295,14 @@ Release for Ansible 2\.10\.0\.
* openssl\_csr \- add support for name constraints extension \([https\://github\.com/ansible\-collections/community\.crypto/issues/46](https\://github\.com/ansible\-collections/community\.crypto/issues/46)\)\.
* openssl\_csr\_info \- add support for name constraints extension \([https\://github\.com/ansible\-collections/community\.crypto/issues/46](https\://github\.com/ansible\-collections/community\.crypto/issues/46)\)\.
-
+
### Bugfixes
* acme\_inspect \- fix problem with Python 3\.5 that JSON was not decoded \([https\://github\.com/ansible\-collections/community\.crypto/issues/86](https\://github\.com/ansible\-collections/community\.crypto/issues/86)\)\.
* get\_certificate \- fix ca\_cert
option handling when proxy\_host
is used \([https\://github\.com/ansible\-collections/community\.crypto/pull/84](https\://github\.com/ansible\-collections/community\.crypto/pull/84)\)\.
* openssl\_\*\, x509\_\* modules \- fix handling of general names which refer to IP networks and not IP addresses \([https\://github\.com/ansible\-collections/community\.crypto/pull/92](https\://github\.com/ansible\-collections/community\.crypto/pull/92)\)\.
-
+
### New Modules
* openssl\_signature \- Sign data with openssl
@@ -1275,12 +1311,12 @@ Release for Ansible 2\.10\.0\.
## v1\.0\.0
-
+
### Release Summary
This is the first proper release of the community\.crypto
collection\. This changelog contains all changes to the modules in this collection that were added after the release of Ansible 2\.9\.0\.
-
+
### Minor Changes
* luks\_device \- accept passphrase
\, new\_passphrase
and remove\_passphrase
\.
@@ -1309,7 +1345,7 @@ This is the first proper release of the community\.crypto
collectio
* openssl\_publickey \- allow to provide private key content via private\_key\_content
option\.
* openssl\_publickey \- allow to return the existing/generated public key directly as publickey
by setting return\_content
to yes
\.
-
+
### Deprecated Features
* openssl\_csr \- all values for the version
option except 1
are deprecated\. The value 1 denotes the current only standardized CSR version\.
@@ -1319,7 +1355,7 @@ This is the first proper release of the community\.crypto
collectio
* The letsencrypt
module has been removed\. Use acme\_certificate
instead\.
-
+
### Bugfixes
* ACME modules\: fix bug in ACME v1 account update code
@@ -1342,7 +1378,7 @@ This is the first proper release of the community\.crypto
collectio
* openssl\_csr \- the module will now enforce that privatekey\_path
is specified when state\=present
\.
* openssl\_publickey \- fix a module crash caused when pyOpenSSL is not installed \([https\://github\.com/ansible/ansible/issues/67035](https\://github\.com/ansible/ansible/issues/67035)\)\.
-
+
### New Modules
* ecs\_domain \- Request validation of a domain with the Entrust Certificate Services \(ECS\) API
diff --git a/CHANGELOG.rst b/CHANGELOG.rst
index 32016971..b2dca8e3 100644
--- a/CHANGELOG.rst
+++ b/CHANGELOG.rst
@@ -4,6 +4,35 @@ Community Crypto Release Notes
.. contents:: Topics
+v2.19.0
+=======
+
+Release Summary
+---------------
+
+Bugfix and feature release.
+
+Minor Changes
+-------------
+
+- When using cryptography >= 42.0.0, use offset-aware ``datetime.datetime`` objects (with timezone UTC) instead of offset-naive UTC timestamps (https://github.com/ansible-collections/community.crypto/issues/726, https://github.com/ansible-collections/community.crypto/pull/727).
+- openssh_cert - avoid UTC functions deprecated in Python 3.12 when using Python 3 (https://github.com/ansible-collections/community.crypto/pull/727).
+
+Deprecated Features
+-------------------
+
+- acme.backends module utils - from community.crypto on, all implementations of ``CryptoBackend`` must override ``get_ordered_csr_identifiers()``. The current default implementation, which simply sorts the result of ``get_csr_identifiers()``, will then be removed (https://github.com/ansible-collections/community.crypto/pull/725).
+
+Bugfixes
+--------
+
+- acme_certificate - respect the order of the CNAME and SAN identifiers that are passed on when creating an ACME order (https://github.com/ansible-collections/community.crypto/issues/723, https://github.com/ansible-collections/community.crypto/pull/725).
+
+New Modules
+-----------
+
+- x509_certificate_convert - Convert X.509 certificates
+
v2.18.0
=======
diff --git a/changelogs/changelog.yaml b/changelogs/changelog.yaml
index 044bd81a..856a965e 100644
--- a/changelogs/changelog.yaml
+++ b/changelogs/changelog.yaml
@@ -1052,6 +1052,33 @@ releases:
name: to_serial
namespace: null
release_date: '2024-02-25'
+ 2.19.0:
+ changes:
+ bugfixes:
+ - acme_certificate - respect the order of the CNAME and SAN identifiers that
+ are passed on when creating an ACME order (https://github.com/ansible-collections/community.crypto/issues/723,
+ https://github.com/ansible-collections/community.crypto/pull/725).
+ deprecated_features:
+ - acme.backends module utils - from community.crypto on, all implementations
+ of ``CryptoBackend`` must override ``get_ordered_csr_identifiers()``. The
+ current default implementation, which simply sorts the result of ``get_csr_identifiers()``,
+ will then be removed (https://github.com/ansible-collections/community.crypto/pull/725).
+ minor_changes:
+ - When using cryptography >= 42.0.0, use offset-aware ``datetime.datetime``
+ objects (with timezone UTC) instead of offset-naive UTC timestamps (https://github.com/ansible-collections/community.crypto/issues/726,
+ https://github.com/ansible-collections/community.crypto/pull/727).
+ - openssh_cert - avoid UTC functions deprecated in Python 3.12 when using Python
+ 3 (https://github.com/ansible-collections/community.crypto/pull/727).
+ release_summary: Bugfix and feature release.
+ fragments:
+ - 2.19.0.yml
+ - 725-acme_certificate-order.yml
+ - 727-cryptography-utc.yml
+ modules:
+ - description: Convert X.509 certificates
+ name: x509_certificate_convert
+ namespace: ''
+ release_date: '2024-04-20'
2.2.0:
changes:
bugfixes:
diff --git a/changelogs/fragments/2.19.0.yml b/changelogs/fragments/2.19.0.yml
deleted file mode 100644
index 56de6d9e..00000000
--- a/changelogs/fragments/2.19.0.yml
+++ /dev/null
@@ -1 +0,0 @@
-release_summary: Bugfix and feature release.
diff --git a/changelogs/fragments/725-acme_certificate-order.yml b/changelogs/fragments/725-acme_certificate-order.yml
deleted file mode 100644
index 55a9b489..00000000
--- a/changelogs/fragments/725-acme_certificate-order.yml
+++ /dev/null
@@ -1,7 +0,0 @@
-bugfixes:
- - "acme_certificate - respect the order of the CNAME and SAN identifiers that are passed on when creating an ACME order
- (https://github.com/ansible-collections/community.crypto/issues/723, https://github.com/ansible-collections/community.crypto/pull/725)."
-deprecated_features:
- - "acme.backends module utils - from community.crypto on, all implementations of ``CryptoBackend`` must override ``get_ordered_csr_identifiers()``.
- The current default implementation, which simply sorts the result of ``get_csr_identifiers()``, will then be removed
- (https://github.com/ansible-collections/community.crypto/pull/725)."
diff --git a/changelogs/fragments/727-cryptography-utc.yml b/changelogs/fragments/727-cryptography-utc.yml
deleted file mode 100644
index 787d8447..00000000
--- a/changelogs/fragments/727-cryptography-utc.yml
+++ /dev/null
@@ -1,4 +0,0 @@
-minor_changes:
- - "When using cryptography >= 42.0.0, use offset-aware ``datetime.datetime`` objects (with timezone UTC) instead of offset-naive UTC timestamps
- (https://github.com/ansible-collections/community.crypto/issues/726, https://github.com/ansible-collections/community.crypto/pull/727)."
- - "openssh_cert - avoid UTC functions deprecated in Python 3.12 when using Python 3 (https://github.com/ansible-collections/community.crypto/pull/727)."