From 97f9003b6c4ba4cd0afe3c053f86ae8abbd2003c Mon Sep 17 00:00:00 2001 From: Rich Megginson Date: Mon, 19 Feb 2024 10:00:36 -0700 Subject: [PATCH] docs(changelog): version v0.23.2 [citest skip] Update changelog and .README.html for version v0.23.2 Signed-off-by: Rich Megginson --- .README.html | 20 ++++++++++---------- CHANGELOG.md | 13 +++++++++++++ 2 files changed, 23 insertions(+), 10 deletions(-) diff --git a/.README.html b/.README.html index 89149f20..77f266fb 100644 --- a/.README.html +++ b/.README.html @@ -349,7 +349,7 @@

sshd_manage_service

phase) or AIX (Ansible service module does not currently support enabled for AIX)

sshd_allow_reload

-

If set to false, a reload of sshd wont happen on change. +

If set to false, a reload of sshd won't happen on change. This can help with troubleshooting. You'll need to manually reload sshd if you want to apply the changed configuration. Defaults to the same value as sshd_manage_service. (Except on AIX, where @@ -372,17 +372,17 @@

sshd_install_service

the above default templates, the name of the installed ssh service will be provided by the sshd_service variable.

sshd_manage_firewall

-

If set to true, the the SSH port(s) will be opened in -firewall. Note, this works only on Red Hat based OS. The default is +

If set to true, the SSH port(s) will be opened in firewall. +Note, this works only on Red Hat based OS. The default is false.

NOTE: sshd_manage_firewall is limited to adding ports. It cannot be used for removing ports. If you want to remove ports, you will need to use the firewall system role directly.

sshd_manage_selinux

-

If set to true, the the selinux will be configured to allow -sshd listening on the given SSH port(s). Note, this works only on Red -Hat based OS. The default is false.

+

If set to true, the selinux will be configured to allow sshd +listening on the given SSH port(s). Note, this works only on Red Hat +based OS. The default is false.

NOTE: sshd_manage_selinux is limited to adding policy. It cannot be used for removing policy. If you want to remove ports, you will need to use the selinux system role directly.

@@ -441,7 +441,7 @@

sshd_config_file

be saved. This is useful mostly when generating configuration snippets to Include from drop-in directory (default in Fedora and RHEL9).

When this path points to a drop-in directory (like -/etc/ssh/sshd_confg.d/00-custom.conf), the main +/etc/ssh/sshd_config.d/00-custom.conf), the main configuration file (defined with the variable sshd_main_config_file) is checked to contain a proper Include directive.

@@ -468,7 +468,7 @@

sshd_config_namespace

id="sshd_config_owner-sshd_config_group-sshd_config_mode">sshd_config_owner, sshd_config_group, sshd_config_mode

Use these variables to set the ownership and permissions for the -openssh config file that this role produces.

+openssh configuration file that this role produces.

sshd_verify_hostkeys

By default (auto), this list contains all the host keys that are present in the produced configuration file. If there are none, the @@ -642,7 +642,7 @@

Example Playbook

tasks: - name: Configure sshd to accept some useful environment variables include_role: - name: ansible-sshd + name: willshersystems.sshd vars: sshd_config_namespace: accept-env sshd: @@ -663,7 +663,7 @@

Template Generation

The sshd_config.j2 and sshd_config_snippet.j2 -templates are programatically generated by the scripts in meta. New +templates are programmatically generated by the scripts in meta. New options should be added to the options_body and/or options_match.

To regenerate the templates, from within the meta/ diff --git a/CHANGELOG.md b/CHANGELOG.md index 251fc09f..d889540e 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,6 +1,19 @@ Changelog ========= +[v0.23.2] - 2024-02-19 +-------------------- + +### Bug Fixes + +- fix: Fix service files generated on EL7 and workaround the tests for containers (#276) + +### Other Changes + +- docs: Fix spelling issues + fix reported issues (#274) +- build(deps): bump actions/checkout from 3 to 4 (#275) +- README.md typo in config word (#277) + [v0.23.1] - 2024-01-25 --------------------