summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRick Elrod <rick@elrod.me>2021-04-04 19:00:41 -0500
committerGitHub <noreply@github.com>2021-04-04 19:00:41 -0500
commit6ac19b7757670029b895b62c4458e8ad2bc965b3 (patch)
tree56089bcc6a7414ab0dc945e865f1a0720fd0e0b5
parent6ed3e37df114147a1be01784c028cebc923d2f20 (diff)
downloadansible-6ac19b7757670029b895b62c4458e8ad2bc965b3.tar.gz
[security] Add more missing no_logs (#74116)
Change: - Add missing no_log on fields and subfields which should have it. - Update several changelogs with CVE id. Signed-off-by: Rick Elrod <rick@elrod.me>
-rw-r--r--changelogs/fragments/471-no_log.yml2
-rw-r--r--changelogs/fragments/community.aws-475-no_log-missing.yml6
-rw-r--r--changelogs/fragments/community.docker-103-docker_swarm-no_log.yml4
-rw-r--r--changelogs/fragments/community.general-2018-missing-no_log-again.yml2
-rw-r--r--changelogs/fragments/community.network-223-no_log-missing.yml6
-rw-r--r--changelogs/fragments/more-no_log-fixes.yml46
-rw-r--r--lib/ansible/modules/cloud/azure/azure_rm_devtestlabartifactsource.py3
-rw-r--r--lib/ansible/modules/cloud/google/gcp_compute_instance.py7
-rw-r--r--lib/ansible/modules/cloud/google/gcp_sql_instance.py2
-rw-r--r--lib/ansible/modules/cloud/ovirt/ovirt_auth.py2
-rw-r--r--lib/ansible/modules/monitoring/pingdom.py2
-rw-r--r--lib/ansible/modules/monitoring/rollbar_deployment.py2
-rw-r--r--lib/ansible/modules/monitoring/stackdriver.py2
-rw-r--r--lib/ansible/modules/monitoring/zabbix/zabbix_action.py6
-rw-r--r--lib/ansible/modules/network/f5/bigip_device_license.py2
-rw-r--r--lib/ansible/modules/network/f5/bigip_dns_nameserver.py2
-rw-r--r--lib/ansible/modules/network/f5/bigip_dns_zone.py2
-rw-r--r--lib/ansible/modules/network/f5/bigip_profile_client_ssl.py4
-rw-r--r--lib/ansible/modules/network/fortios/fortios_dlp_fp_doc_source.py2
-rw-r--r--lib/ansible/modules/network/fortios/fortios_endpoint_control_forticlient_ems.py2
-rw-r--r--lib/ansible/modules/network/fortios/fortios_endpoint_control_profile.py4
-rw-r--r--lib/ansible/modules/network/fortios/fortios_endpoint_control_settings.py2
-rw-r--r--lib/ansible/modules/network/fortios/fortios_extender_controller_extender.py8
-rw-r--r--lib/ansible/modules/network/fortios/fortios_firewall_ssh_local_ca.py4
-rw-r--r--lib/ansible/modules/network/fortios/fortios_firewall_ssh_local_key.py4
-rw-r--r--lib/ansible/modules/network/fortios/fortios_log_disk_setting.py2
-rw-r--r--lib/ansible/modules/network/fortios/fortios_router_bgp.py2
-rw-r--r--lib/ansible/modules/network/fortios/fortios_router_ospf.py6
-rw-r--r--lib/ansible/modules/network/fortios/fortios_router_rip.py2
-rw-r--r--lib/ansible/modules/network/fortios/fortios_system_admin.py4
-rw-r--r--lib/ansible/modules/network/fortios/fortios_system_api_user.py2
-rw-r--r--lib/ansible/modules/network/fortios/fortios_system_interface.py4
-rw-r--r--lib/ansible/modules/network/fortios/fortios_system_sdn_connector.py12
-rw-r--r--lib/ansible/modules/network/fortios/fortios_system_virtual_wan_link.py2
-rw-r--r--lib/ansible/modules/network/fortios/fortios_user_radius.py8
-rw-r--r--lib/ansible/modules/network/fortios/fortios_user_tacacsplus.py6
-rw-r--r--lib/ansible/modules/network/fortios/fortios_vpn_ipsec_manualkey.py4
-rw-r--r--lib/ansible/modules/network/fortios/fortios_vpn_ipsec_manualkey_interface.py4
-rw-r--r--lib/ansible/modules/network/fortios/fortios_vpn_ipsec_phase1.py8
-rw-r--r--lib/ansible/modules/network/fortios/fortios_vpn_ipsec_phase1_interface.py8
-rw-r--r--lib/ansible/modules/network/fortios/fortios_vpn_ssl_web_portal.py4
-rw-r--r--lib/ansible/modules/network/fortios/fortios_wireless_controller_vap.py10
-rw-r--r--lib/ansible/modules/network/fortios/fortios_wireless_controller_wtp.py2
-rw-r--r--lib/ansible/modules/network/fortios/fortios_wireless_controller_wtp_profile.py4
-rw-r--r--lib/ansible/modules/network/ios/ios_ntp.py4
-rw-r--r--lib/ansible/modules/network/netscaler/netscaler_lb_monitor.py4
-rw-r--r--lib/ansible/modules/network/nxos/nxos_aaa_server_host.py2
-rw-r--r--lib/ansible/modules/notification/logentries_msg.py2
-rw-r--r--lib/ansible/modules/storage/netapp/na_elementsw_cluster_snmp.py4
-rw-r--r--lib/ansible/modules/web_infrastructure/ansible_tower/tower_credential.py4
50 files changed, 146 insertions, 96 deletions
diff --git a/changelogs/fragments/471-no_log.yml b/changelogs/fragments/471-no_log.yml
index 14217c20f5..e1c537bc0c 100644
--- a/changelogs/fragments/471-no_log.yml
+++ b/changelogs/fragments/471-no_log.yml
@@ -1,2 +1,2 @@
security_fixes:
-- aws_secret - flag the ``secret`` parameter as containing sensitive data which shouldn't be logged (https://github.com/ansible-collections/community.aws/pull/471).
+- aws_secret - flag the ``secret`` parameter as containing sensitive data which shouldn't be logged (https://github.com/ansible-collections/community.aws/pull/471) (CVE-2021-3447).
diff --git a/changelogs/fragments/community.aws-475-no_log-missing.yml b/changelogs/fragments/community.aws-475-no_log-missing.yml
index c07ab112ad..9e501df8aa 100644
--- a/changelogs/fragments/community.aws-475-no_log-missing.yml
+++ b/changelogs/fragments/community.aws-475-no_log-missing.yml
@@ -1,4 +1,4 @@
security_fixes:
-- "aws_direct_connect_virtual_interface - mark the ``authentication_key`` parameter as ``no_log`` to avoid accidental leaking of secrets in logs (https://github.com/ansible-collections/community.aws/pull/475)."
-- "sts_assume_role - mark the ``mfa_token`` parameter as ``no_log`` to avoid accidental leaking of secrets in logs (https://github.com/ansible-collections/community.aws/pull/475)."
-- "sts_session_token - mark the ``mfa_token`` parameter as ``no_log`` to avoid accidental leaking of secrets in logs (https://github.com/ansible-collections/community.aws/pull/475)."
+- "aws_direct_connect_virtual_interface - mark the ``authentication_key`` parameter as ``no_log`` to avoid accidental leaking of secrets in logs (https://github.com/ansible-collections/community.aws/pull/475). (CVE-2021-3447)"
+- "sts_assume_role - mark the ``mfa_token`` parameter as ``no_log`` to avoid accidental leaking of secrets in logs (https://github.com/ansible-collections/community.aws/pull/475). (CVE-2021-3447)"
+- "sts_session_token - mark the ``mfa_token`` parameter as ``no_log`` to avoid accidental leaking of secrets in logs (https://github.com/ansible-collections/community.aws/pull/475). (CVE-2021-3447)"
diff --git a/changelogs/fragments/community.docker-103-docker_swarm-no_log.yml b/changelogs/fragments/community.docker-103-docker_swarm-no_log.yml
index a2e40747ac..f94775f1c0 100644
--- a/changelogs/fragments/community.docker-103-docker_swarm-no_log.yml
+++ b/changelogs/fragments/community.docker-103-docker_swarm-no_log.yml
@@ -1,4 +1,4 @@
security_fixes:
-- "docker_swarm - the ``join_token`` option is now marked as ``no_log`` so it is no longer written into logs (https://github.com/ansible-collections/community.docker/pull/103)."
+- "docker_swarm - the ``join_token`` option is now marked as ``no_log`` so it is no longer written into logs (https://github.com/ansible-collections/community.docker/pull/103). (CVE-2021-3447)"
breaking_changes:
-- "docker_swarm - if ``join_token`` is specified, a returned join token with the same value will be replaced by ``VALUE_SPECIFIED_IN_NO_LOG_PARAMETER``. Make sure that you do not blindly use the join tokens from the return value of this module when the module is invoked with ``join_token`` specified! This breaking change appears in a minor release since it is necessary to fix a security issue (https://github.com/ansible-collections/community.docker/pull/103)."
+- "docker_swarm - if ``join_token`` is specified, a returned join token with the same value will be replaced by ``VALUE_SPECIFIED_IN_NO_LOG_PARAMETER``. Make sure that you do not blindly use the join tokens from the return value of this module when the module is invoked with ``join_token`` specified! This breaking change appears in a minor release since it is necessary to fix a security issue (https://github.com/ansible-collections/community.docker/pull/103). (CVE-2021-3447)"
diff --git a/changelogs/fragments/community.general-2018-missing-no_log-again.yml b/changelogs/fragments/community.general-2018-missing-no_log-again.yml
index 7410b7643e..90e83b370d 100644
--- a/changelogs/fragments/community.general-2018-missing-no_log-again.yml
+++ b/changelogs/fragments/community.general-2018-missing-no_log-again.yml
@@ -1,2 +1,2 @@
security_fixes:
-- "na_cdot_user - mark the ``set_password`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/2018)."
+- "na_cdot_user - mark the ``set_password`` parameter as ``no_log`` to avoid leakage of secrets (https://github.com/ansible-collections/community.general/pull/2018). (CVE-2021-3447)"
diff --git a/changelogs/fragments/community.network-223-no_log-missing.yml b/changelogs/fragments/community.network-223-no_log-missing.yml
index 889fd670b1..84d5934e68 100644
--- a/changelogs/fragments/community.network-223-no_log-missing.yml
+++ b/changelogs/fragments/community.network-223-no_log-missing.yml
@@ -1,4 +1,4 @@
security_fixes:
-- "avi_webhook - mark the ``verification_token`` parameter as ``no_log`` to prevent potential leaking of secret values (https://github.com/ansible-collections/community.network/pull/223)."
-- "avi_sslkeyandcertificate - mark the ``enckey_base64`` parameter as ``no_log`` to prevent potential leaking of secret values (https://github.com/ansible-collections/community.network/pull/223)."
-- "avi_cloudconnectoruser - mark the ``azure_userpass`` parameter as ``no_log`` to prevent leaking of secret values (https://github.com/ansible-collections/community.network/pull/223)."
+- "avi_webhook - mark the ``verification_token`` parameter as ``no_log`` to prevent potential leaking of secret values (https://github.com/ansible-collections/community.network/pull/223). (CVE-2021-3447)"
+- "avi_sslkeyandcertificate - mark the ``enckey_base64`` parameter as ``no_log`` to prevent potential leaking of secret values (https://github.com/ansible-collections/community.network/pull/223). (CVE-2021-3447)"
+- "avi_cloudconnectoruser - mark the ``azure_userpass`` parameter as ``no_log`` to prevent leaking of secret values (https://github.com/ansible-collections/community.network/pull/223). (CVE-2021-3447)"
diff --git a/changelogs/fragments/more-no_log-fixes.yml b/changelogs/fragments/more-no_log-fixes.yml
new file mode 100644
index 0000000000..1f234faaee
--- /dev/null
+++ b/changelogs/fragments/more-no_log-fixes.yml
@@ -0,0 +1,46 @@
+security_fixes:
+ - azure_rm_devtestlabartifactsource - ``security_token`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - bigip_device_license - ``license_key`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - bigip_dns_nameserver - ``tsig_key`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - bigip_dns_zone - ``tsig_server_key`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - bigip_profile_client_ssl - ``key`` and ``passphrase`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - fortios_dlp_fp_doc_source - ``password`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - fortios_endpoint_control_forticlient_ems - ``admin_password`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - fortios_endpoint_control_profile - ``preshared_key`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - fortios_endpoint_control_settings - ``forticlient_reg_key`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - fortios_extender_controller_extender - ``aaa_shared_secret``, ``ha_shared_secret``, ``modem_passwd``, and ``ppp_password`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - fortios_firewall_ssh_local_ca - ``password`` and ``private_key`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - fortios_firewall_ssh_local_key - ``password`` and ``private_key`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - fortios_log_disk_setting - ``uploadpass`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - fortios_router_bgp - ``password`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - fortios_router_ospf - ``authentication_key`` and `md5_key`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - fortios_router_rip - ``auth_string`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - fortios_system_admin - ``fortitoken`` and ``password`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - fortios_system_api_user - ``api_key`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - fortios_system_interface - ``password`` and ``pptp_password`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - fortios_system_sdn_connector - ``access_key``, ``client_secret``, ``key_passwd``, ``password``, ``private_key``, and ``secret_key`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - fortios_system_virtual_wan_link - ``password`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - fortios_user_radius - ``secret``, ``rsso_secret``, ``secondary_secret``, and ``tertiary_secret`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - fortios_user_tacacsplus - ``key``, ``secondary_key``, and ``tertiary_key`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - fortios_vpn_ipsec_manualkey - ``authkey`` and ``enckey`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - fortios_vpn_ipsec_manualkey_interface - ``auth_key`` and ``enc_key`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - fortios_vpn_ipsec_phase1 - ``authpasswd``, ``group_authentication_secret``, ``ppk_secret``, ``psksecret``, and ``psksecret_remote`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - fortios_vpn_ipsec_phase1_interface - ``authpasswd``, ``group_authentication_secret``, ``ppk_secret``, ``psksecret``, and ``psksecret_remote`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - fortios_vpn_ssl_web_portal - ``logon_password`` and ``sso_password`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - fortios_wireless_controller_vap - ``captive_portal_macauth_radius_secret``, ``captive_portal_radius_secret``, ``key``, and ``passphrase`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - fortios_wireless_controller_wtp - ``login_passwd`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - fortios_wireless_controller_wtp_profile - ``fortipresence_secret`` and ``login_passwd`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - gcp_compute_instance - ``raw_key`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - gcp_container_cluster - ``password`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - gcp_sql_instance - ``password`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - ios_ntp - ``auth_key`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - logentries_msg - ``token`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - na_elementsw_cluster_snmp - ``password`` and ``passphrase`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - netscaler_lb_monitor - ``password`` and ``secondarypassword`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - nxos_aaa_server_host - ``key`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - ovirt_auth - ``token`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - pingdom - ``key`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - rollbar_deployment - ``token` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - stackdriver - ``key`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - tower_credential - ``security_token`` and ``secret`` no longer appears in logs (``no_log``) (CVE-2021-3447)
+ - zabbix_action - ``password`` no longer appears in logs (``no_log``) (CVE-2021-3447)
diff --git a/lib/ansible/modules/cloud/azure/azure_rm_devtestlabartifactsource.py b/lib/ansible/modules/cloud/azure/azure_rm_devtestlabartifactsource.py
index 70c2f83814..49a5fff6b2 100644
--- a/lib/ansible/modules/cloud/azure/azure_rm_devtestlabartifactsource.py
+++ b/lib/ansible/modules/cloud/azure/azure_rm_devtestlabartifactsource.py
@@ -164,7 +164,8 @@ class AzureRMDevTestLabArtifactsSource(AzureRMModuleBase):
type='str'
),
security_token=dict(
- type='str'
+ type='str',
+ no_log=True
),
is_enabled=dict(
type='bool'
diff --git a/lib/ansible/modules/cloud/google/gcp_compute_instance.py b/lib/ansible/modules/cloud/google/gcp_compute_instance.py
index 2b922c69ba..581e7a32c3 100644
--- a/lib/ansible/modules/cloud/google/gcp_compute_instance.py
+++ b/lib/ansible/modules/cloud/google/gcp_compute_instance.py
@@ -889,7 +889,10 @@ def main():
auto_delete=dict(type='bool'),
boot=dict(type='bool'),
device_name=dict(type='str'),
- disk_encryption_key=dict(type='dict', options=dict(raw_key=dict(type='str'), rsa_encrypted_key=dict(type='str'))),
+ disk_encryption_key=dict(
+ type='dict',
+ options=dict(raw_key=dict(type='str', no_log=True), rsa_encrypted_key=dict(type='str', no_log=True))
+ ),
index=dict(type='int'),
initialize_params=dict(
type='dict',
@@ -898,7 +901,7 @@ def main():
disk_size_gb=dict(type='int'),
disk_type=dict(type='str'),
source_image=dict(type='str', aliases=['image', 'image_family']),
- source_image_encryption_key=dict(type='dict', options=dict(raw_key=dict(type='str'))),
+ source_image_encryption_key=dict(type='dict', options=dict(raw_key=dict(type='str', no_log=True))),
),
),
interface=dict(type='str', choices=['SCSI', 'NVME']),
diff --git a/lib/ansible/modules/cloud/google/gcp_sql_instance.py b/lib/ansible/modules/cloud/google/gcp_sql_instance.py
index b2f062bcd3..c6ef771313 100644
--- a/lib/ansible/modules/cloud/google/gcp_sql_instance.py
+++ b/lib/ansible/modules/cloud/google/gcp_sql_instance.py
@@ -630,7 +630,7 @@ def main():
connect_retry_interval=dict(type='int'),
dump_file_path=dict(type='str'),
master_heartbeat_period=dict(type='int'),
- password=dict(type='str'),
+ password=dict(type='str', no_log=True),
ssl_cipher=dict(type='str'),
username=dict(type='str'),
verify_server_certificate=dict(type='bool'),
diff --git a/lib/ansible/modules/cloud/ovirt/ovirt_auth.py b/lib/ansible/modules/cloud/ovirt/ovirt_auth.py
index 06034925e2..cb208cd404 100644
--- a/lib/ansible/modules/cloud/ovirt/ovirt_auth.py
+++ b/lib/ansible/modules/cloud/ovirt/ovirt_auth.py
@@ -223,7 +223,7 @@ def main():
kerberos=dict(required=False, type='bool', default=False),
headers=dict(required=False, type='dict'),
state=dict(default='present', choices=['present', 'absent']),
- token=dict(default=None),
+ token=dict(default=None, no_log=True),
ovirt_auth=dict(required=None, type='dict'),
),
required_if=[
diff --git a/lib/ansible/modules/monitoring/pingdom.py b/lib/ansible/modules/monitoring/pingdom.py
index a9025604f5..2636ffd543 100644
--- a/lib/ansible/modules/monitoring/pingdom.py
+++ b/lib/ansible/modules/monitoring/pingdom.py
@@ -113,7 +113,7 @@ def main():
checkid=dict(required=True),
uid=dict(required=True),
passwd=dict(required=True, no_log=True),
- key=dict(required=True)
+ key=dict(required=True, no_log=True)
)
)
diff --git a/lib/ansible/modules/monitoring/rollbar_deployment.py b/lib/ansible/modules/monitoring/rollbar_deployment.py
index 4125c1319b..841af61845 100644
--- a/lib/ansible/modules/monitoring/rollbar_deployment.py
+++ b/lib/ansible/modules/monitoring/rollbar_deployment.py
@@ -83,7 +83,7 @@ def main():
module = AnsibleModule(
argument_spec=dict(
- token=dict(required=True),
+ token=dict(required=True, no_log=True),
environment=dict(required=True),
revision=dict(required=True),
user=dict(required=False),
diff --git a/lib/ansible/modules/monitoring/stackdriver.py b/lib/ansible/modules/monitoring/stackdriver.py
index a33058a4ea..0c669d3e33 100644
--- a/lib/ansible/modules/monitoring/stackdriver.py
+++ b/lib/ansible/modules/monitoring/stackdriver.py
@@ -144,7 +144,7 @@ def main():
module = AnsibleModule(
argument_spec=dict(
- key=dict(required=True),
+ key=dict(required=True, no_log=True),
event=dict(required=True, choices=['deploy', 'annotation']),
msg=dict(),
revision_id=dict(),
diff --git a/lib/ansible/modules/monitoring/zabbix/zabbix_action.py b/lib/ansible/modules/monitoring/zabbix/zabbix_action.py
index 4158763bb0..3105ab42dc 100644
--- a/lib/ansible/modules/monitoring/zabbix/zabbix_action.py
+++ b/lib/ansible/modules/monitoring/zabbix/zabbix_action.py
@@ -1735,7 +1735,7 @@ def main():
required=False,
choices=['agent', 'server', 'proxy']
),
- password=dict(type='str', required=False),
+ password=dict(type='str', required=False, no_log=True),
port=dict(type='int', required=False),
run_on_groups=dict(type='list', required=False),
run_on_hosts=dict(type='list', required=False),
@@ -1827,7 +1827,7 @@ def main():
required=False,
choices=['agent', 'server', 'proxy']
),
- password=dict(type='str', required=False),
+ password=dict(type='str', required=False, no_log=True),
port=dict(type='int', required=False),
run_on_groups=dict(type='list', required=False),
run_on_hosts=dict(type='list', required=False),
@@ -1911,7 +1911,7 @@ def main():
required=False,
choices=['agent', 'server', 'proxy']
),
- password=dict(type='str', required=False),
+ password=dict(type='str', required=False, no_log=True),
port=dict(type='int', required=False),
run_on_groups=dict(type='list', required=False),
run_on_hosts=dict(type='list', required=False),
diff --git a/lib/ansible/modules/network/f5/bigip_device_license.py b/lib/ansible/modules/network/f5/bigip_device_license.py
index f3c769e3b8..c6969a2bee 100644
--- a/lib/ansible/modules/network/f5/bigip_device_license.py
+++ b/lib/ansible/modules/network/f5/bigip_device_license.py
@@ -847,7 +847,7 @@ class ArgumentSpec(object):
def __init__(self):
self.supports_check_mode = True
argument_spec = dict(
- license_key=dict(),
+ license_key=dict(no_log=True),
license_server=dict(
default='activate.f5.com'
),
diff --git a/lib/ansible/modules/network/f5/bigip_dns_nameserver.py b/lib/ansible/modules/network/f5/bigip_dns_nameserver.py
index 9d92bb0278..ca051b9139 100644
--- a/lib/ansible/modules/network/f5/bigip_dns_nameserver.py
+++ b/lib/ansible/modules/network/f5/bigip_dns_nameserver.py
@@ -433,7 +433,7 @@ class ArgumentSpec(object):
address=dict(),
service_port=dict(),
route_domain=dict(),
- tsig_key=dict(),
+ tsig_key=dict(no_log=True),
state=dict(
default='present',
choices=['present', 'absent']
diff --git a/lib/ansible/modules/network/f5/bigip_dns_zone.py b/lib/ansible/modules/network/f5/bigip_dns_zone.py
index 3f91cbef28..75cf4441f7 100644
--- a/lib/ansible/modules/network/f5/bigip_dns_zone.py
+++ b/lib/ansible/modules/network/f5/bigip_dns_zone.py
@@ -579,7 +579,7 @@ class ArgumentSpec(object):
)
),
nameservers=dict(type='list'),
- tsig_server_key=dict(),
+ tsig_server_key=dict(no_log=True),
partition=dict(
default='Common',
fallback=(env_fallback, ['F5_PARTITION'])
diff --git a/lib/ansible/modules/network/f5/bigip_profile_client_ssl.py b/lib/ansible/modules/network/f5/bigip_profile_client_ssl.py
index 671a62da49..f3a193526b 100644
--- a/lib/ansible/modules/network/f5/bigip_profile_client_ssl.py
+++ b/lib/ansible/modules/network/f5/bigip_profile_client_ssl.py
@@ -1053,9 +1053,9 @@ class ArgumentSpec(object):
type='list',
options=dict(
cert=dict(required=True),
- key=dict(required=True),
+ key=dict(required=True, no_log=True),
chain=dict(),
- passphrase=dict()
+ passphrase=dict(no_log=True)
)
),
state=dict(
diff --git a/lib/ansible/modules/network/fortios/fortios_dlp_fp_doc_source.py b/lib/ansible/modules/network/fortios/fortios_dlp_fp_doc_source.py
index 481b9393d9..fd3debb18b 100644
--- a/lib/ansible/modules/network/fortios/fortios_dlp_fp_doc_source.py
+++ b/lib/ansible/modules/network/fortios/fortios_dlp_fp_doc_source.py
@@ -345,7 +345,7 @@ def main():
"keep-modified": {"required": False, "type": "str",
"choices": ["enable", "disable"]},
"name": {"required": True, "type": "str"},
- "password": {"required": False, "type": "str"},
+ "password": {"required": False, "type": "str", "no_log": True},
"period": {"required": False, "type": "str",
"choices": ["none", "daily", "weekly",
"monthly"]},
diff --git a/lib/ansible/modules/network/fortios/fortios_endpoint_control_forticlient_ems.py b/lib/ansible/modules/network/fortios/fortios_endpoint_control_forticlient_ems.py
index ed82fdd007..b6f81f0ba9 100644
--- a/lib/ansible/modules/network/fortios/fortios_endpoint_control_forticlient_ems.py
+++ b/lib/ansible/modules/network/fortios/fortios_endpoint_control_forticlient_ems.py
@@ -280,7 +280,7 @@ def main():
"state": {"required": True, "type": "str",
"choices": ["present", "absent"]},
"address": {"required": False, "type": "str"},
- "admin-password": {"required": False, "type": "str"},
+ "admin-password": {"required": False, "type": "str", "no_log": True},
"admin-type": {"required": False, "type": "str",
"choices": ["Windows", "LDAP"]},
"admin-username": {"required": False, "type": "str"},
diff --git a/lib/ansible/modules/network/fortios/fortios_endpoint_control_profile.py b/lib/ansible/modules/network/fortios/fortios_endpoint_control_profile.py
index bcaaefafbd..cf8348ad18 100644
--- a/lib/ansible/modules/network/fortios/fortios_endpoint_control_profile.py
+++ b/lib/ansible/modules/network/fortios/fortios_endpoint_control_profile.py
@@ -826,7 +826,7 @@ def main():
"auth-method": {"required": False, "type": "str",
"choices": ["psk", "certificate"]},
"name": {"required": True, "type": "str"},
- "preshared-key": {"required": False, "type": "str"},
+ "preshared-key": {"required": False, "type": "str", "no_log": True},
"remote-gw": {"required": False, "type": "str"},
"sslvpn-access-port": {"required": False, "type": "int"},
"sslvpn-require-certificate": {"required": False, "type": "str",
@@ -847,7 +847,7 @@ def main():
"auth-method": {"required": False, "type": "str",
"choices": ["psk", "certificate"]},
"name": {"required": True, "type": "str"},
- "preshared-key": {"required": False, "type": "str"},
+ "preshared-key": {"required": False, "type": "str", "no_log": True},
"remote-gw": {"required": False, "type": "str"},
"sslvpn-access-port": {"required": False, "type": "int"},
"sslvpn-require-certificate": {"required": False, "type": "str",
diff --git a/lib/ansible/modules/network/fortios/fortios_endpoint_control_settings.py b/lib/ansible/modules/network/fortios/fortios_endpoint_control_settings.py
index 6f6a4dfd31..42af253cd8 100644
--- a/lib/ansible/modules/network/fortios/fortios_endpoint_control_settings.py
+++ b/lib/ansible/modules/network/fortios/fortios_endpoint_control_settings.py
@@ -299,7 +299,7 @@ def main():
"forticlient-offline-grace": {"required": False, "type": "str",
"choices": ["enable", "disable"]},
"forticlient-offline-grace-interval": {"required": False, "type": "int"},
- "forticlient-reg-key": {"required": False, "type": "str"},
+ "forticlient-reg-key": {"required": False, "type": "str", "no_log": True},
"forticlient-reg-key-enforce": {"required": False, "type": "str",
"choices": ["enable", "disable"]},
"forticlient-reg-timeout": {"required": False, "type": "int"},
diff --git a/lib/ansible/modules/network/fortios/fortios_extender_controller_extender.py b/lib/ansible/modules/network/fortios/fortios_extender_controller_extender.py
index 8cbdd01faf..ac9b33b102 100644
--- a/lib/ansible/modules/network/fortios/fortios_extender_controller_extender.py
+++ b/lib/ansible/modules/network/fortios/fortios_extender_controller_extender.py
@@ -442,7 +442,7 @@ def main():
"options": {
"state": {"required": True, "type": "str",
"choices": ["present", "absent"]},
- "aaa-shared-secret": {"required": False, "type": "str"},
+ "aaa-shared-secret": {"required": False, "type": "str", "no_log": True},
"access-point-name": {"required": False, "type": "str"},
"admin": {"required": False, "type": "str",
"choices": ["disable", "discovered", "enable"]},
@@ -457,14 +457,14 @@ def main():
"choices": ["dial-on-demand", "always-connect"]},
"dial-status": {"required": False, "type": "int"},
"ext-name": {"required": False, "type": "str"},
- "ha-shared-secret": {"required": False, "type": "str"},
+ "ha-shared-secret": {"required": False, "type": "str", "no_log": True},
"id": {"required": True, "type": "str"},
"ifname": {"required": False, "type": "str"},
"initiated-update": {"required": False, "type": "str",
"choices": ["enable", "disable"]},
"mode": {"required": False, "type": "str",
"choices": ["standalone", "redundant"]},
- "modem-passwd": {"required": False, "type": "str"},
+ "modem-passwd": {"required": False, "type": "str", "no_log": True},
"modem-type": {"required": False, "type": "str",
"choices": ["cdma", "gsm/lte", "wimax"]},
"multi-mode": {"required": False, "type": "str",
@@ -474,7 +474,7 @@ def main():
"choices": ["auto", "pap", "chap"]},
"ppp-echo-request": {"required": False, "type": "str",
"choices": ["enable", "disable"]},
- "ppp-password": {"required": False, "type": "str"},
+ "ppp-password": {"required": False, "type": "str", "no_log": True},
"ppp-username": {"required": False, "type": "str"},
"primary-ha": {"required": False, "type": "str"},
"quota-limit-mb": {"required": False, "type": "int"},
diff --git a/lib/ansible/modules/network/fortios/fortios_firewall_ssh_local_ca.py b/lib/ansible/modules/network/fortios/fortios_firewall_ssh_local_ca.py
index 4b3ce7332b..e21dd0fbfb 100644
--- a/lib/ansible/modules/network/fortios/fortios_firewall_ssh_local_ca.py
+++ b/lib/ansible/modules/network/fortios/fortios_firewall_ssh_local_ca.py
@@ -256,8 +256,8 @@ def main():
"state": {"required": True, "type": "str",
"choices": ["present", "absent"]},
"name": {"required": True, "type": "str"},
- "password": {"required": False, "type": "str"},
- "private-key": {"required": False, "type": "str"},
+ "password": {"required": False, "type": "str", "no_log": True},
+ "private-key": {"required": False, "type": "str", "no_log": True},
"public-key": {"required": False, "type": "str"},
"source": {"required": False, "type": "str",
"choices": ["built-in", "user"]}
diff --git a/lib/ansible/modules/network/fortios/fortios_firewall_ssh_local_key.py b/lib/ansible/modules/network/fortios/fortios_firewall_ssh_local_key.py
index 6f29cfe81f..3a89f2c0b3 100644
--- a/lib/ansible/modules/network/fortios/fortios_firewall_ssh_local_key.py
+++ b/lib/ansible/modules/network/fortios/fortios_firewall_ssh_local_key.py
@@ -256,8 +256,8 @@ def main():
"state": {"required": True, "type": "str",
"choices": ["present", "absent"]},
"name": {"required": True, "type": "str"},
- "password": {"required": False, "type": "str"},
- "private-key": {"required": False, "type": "str"},
+ "password": {"required": False, "type": "str", "no_log": True},
+ "private-key": {"required": False, "type": "str", "no_log": True},
"public-key": {"required": False, "type": "str"},
"source": {"required": False, "type": "str",
"choices": ["built-in", "user"]}
diff --git a/lib/ansible/modules/network/fortios/fortios_log_disk_setting.py b/lib/ansible/modules/network/fortios/fortios_log_disk_setting.py
index 2485eaf28d..f0913ecb24 100644
--- a/lib/ansible/modules/network/fortios/fortios_log_disk_setting.py
+++ b/lib/ansible/modules/network/fortios/fortios_log_disk_setting.py
@@ -422,7 +422,7 @@ def main():
"disable"]},
"uploaddir": {"required": False, "type": "str"},
"uploadip": {"required": False, "type": "str"},
- "uploadpass": {"required": False, "type": "str"},
+ "uploadpass": {"required": False, "type": "str", "no_log": True},
"uploadport": {"required": False, "type": "int"},
"uploadsched": {"required": False, "type": "str",
"choices": ["disable", "enable"]},
diff --git a/lib/ansible/modules/network/fortios/fortios_router_bgp.py b/lib/ansible/modules/network/fortios/fortios_router_bgp.py
index 7e94911136..625a7b69ba 100644
--- a/lib/ansible/modules/network/fortios/fortios_router_bgp.py
+++ b/lib/ansible/modules/network/fortios/fortios_router_bgp.py
@@ -1794,7 +1794,7 @@ def main():
"choices": ["enable", "disable"]},
"passive": {"required": False, "type": "str",
"choices": ["enable", "disable"]},
- "password": {"required": False, "type": "str"},
+ "password": {"required": False, "type": "str", "no_log": True},
"prefix-list-in": {"required": False, "type": "str"},
"prefix-list-in6": {"required": False, "type": "str"},
"prefix-list-out": {"required": False, "type": "str"},
diff --git a/lib/ansible/modules/network/fortios/fortios_router_ospf.py b/lib/ansible/modules/network/fortios/fortios_router_ospf.py
index 62e2964786..00da859070 100644
--- a/lib/ansible/modules/network/fortios/fortios_router_ospf.py
+++ b/lib/ansible/modules/network/fortios/fortios_router_ospf.py
@@ -841,7 +841,7 @@ def main():
"options": {
"authentication": {"required": False, "type": "str",
"choices": ["none", "text", "md5"]},
- "authentication-key": {"required": False, "type": "str"},
+ "authentication-key": {"required": False, "type": "str", "no_log": True},
"dead-interval": {"required": False, "type": "int"},
"hello-interval": {"required": False, "type": "int"},
"md5-key": {"required": False, "type": "str"},
@@ -898,7 +898,7 @@ def main():
"options": {
"authentication": {"required": False, "type": "str",
"choices": ["none", "text", "md5"]},
- "authentication-key": {"required": False, "type": "str"},
+ "authentication-key": {"required": False, "type": "str", "no_log": True},
"bfd": {"required": False, "type": "str",
"choices": ["global", "enable", "disable"]},
"cost": {"required": False, "type": "int"},
@@ -909,7 +909,7 @@ def main():
"hello-multiplier": {"required": False, "type": "int"},
"interface": {"required": False, "type": "str"},
"ip": {"required": False, "type": "str"},
- "md5-key": {"required": False, "type": "str"},
+ "md5-key": {"required": False, "type": "str", "no_log": True},
"mtu": {"required": False, "type": "int"},
"mtu-ignore": {"required": False, "type": "str",
"choices": ["enable", "disable"]},
diff --git a/lib/ansible/modules/network/fortios/fortios_router_rip.py b/lib/ansible/modules/network/fortios/fortios_router_rip.py
index 3d372c24f2..b54873ea41 100644
--- a/lib/ansible/modules/network/fortios/fortios_router_rip.py
+++ b/lib/ansible/modules/network/fortios/fortios_router_rip.py
@@ -522,7 +522,7 @@ def main():
"auth-keychain": {"required": False, "type": "str"},
"auth-mode": {"required": False, "type": "str",
"choices": ["none", "text", "md5"]},
- "auth-string": {"required": False, "type": "str"},
+ "auth-string": {"required": False, "type": "str", "no_log": True},
"flags": {"required": False, "type": "int"},
"name": {"required": True, "type": "str"},
"receive-version": {"required": False, "type": "str",
diff --git a/lib/ansible/modules/network/fortios/fortios_system_admin.py b/lib/ansible/modules/network/fortios/fortios_system_admin.py
index c89486ebb7..72eee0e746 100644
--- a/lib/ansible/modules/network/fortios/fortios_system_admin.py
+++ b/lib/ansible/modules/network/fortios/fortios_system_admin.py
@@ -763,7 +763,7 @@ def main():
"email-to": {"required": False, "type": "str"},
"force-password-change": {"required": False, "type": "str",
"choices": ["enable", "disable"]},
- "fortitoken": {"required": False, "type": "str"},
+ "fortitoken": {"required": False, "type": "str", "no_log": True},
"guest-auth": {"required": False, "type": "str",
"choices": ["disable", "enable"]},
"guest-lang": {"required": False, "type": "str"},
@@ -855,7 +855,7 @@ def main():
"usr-name": {"required": True, "type": "str"}
}},
"name": {"required": True, "type": "str"},
- "password": {"required": False, "type": "str"},
+ "password": {"required": False, "type": "str", "no_log": True},
"password-expire": {"required": False, "type": "str"},
"peer-auth": {"required": False, "type": "str",
"choices": ["enable", "disable"]},
diff --git a/lib/ansible/modules/network/fortios/fortios_system_api_user.py b/lib/ansible/modules/network/fortios/fortios_system_api_user.py
index 8855dbf594..889dea6d16 100644
--- a/lib/ansible/modules/network/fortios/fortios_system_api_user.py
+++ b/lib/ansible/modules/network/fortios/fortios_system_api_user.py
@@ -320,7 +320,7 @@ def main():
"state": {"required": True, "type": "str",
"choices": ["present", "absent"]},
"accprofile": {"required": False, "type": "str"},
- "api-key": {"required": False, "type": "str"},
+ "api-key": {"required": False, "type": "str", "no_log": True},
"comments": {"required": False, "type": "str"},
"cors-allow-origin": {"required": False, "type": "str"},
"name": {"required": True, "type": "str"},
diff --git a/lib/ansible/modules/network/fortios/fortios_system_interface.py b/lib/ansible/modules/network/fortios/fortios_system_interface.py
index 5a1da7590b..078f03ce32 100644
--- a/lib/ansible/modules/network/fortios/fortios_system_interface.py
+++ b/lib/ansible/modules/network/fortios/fortios_system_interface.py
@@ -2050,7 +2050,7 @@ def main():
"both"]},
"outbandwidth": {"required": False, "type": "int"},
"padt-retry-timeout": {"required": False, "type": "int"},
- "password": {"required": False, "type": "str"},
+ "password": {"required": False, "type": "str", "no_log": True},
"ping-serv-status": {"required": False, "type": "int"},
"polling-interval": {"required": False, "type": "int"},
"pppoe-unnumbered-negotiate": {"required": False, "type": "str",
@@ -2060,7 +2060,7 @@ def main():
"mschapv1", "mschapv2"]},
"pptp-client": {"required": False, "type": "str",
"choices": ["enable", "disable"]},
- "pptp-password": {"required": False, "type": "str"},
+ "pptp-password": {"required": False, "type": "str", "no_log": True},
"pptp-server-ip": {"required": False, "type": "str"},
"pptp-timeout": {"required": False, "type": "int"},
"pptp-user": {"required": False, "type": "str"},
diff --git a/lib/ansible/modules/network/fortios/fortios_system_sdn_connector.py b/lib/ansible/modules/network/fortios/fortios_system_sdn_connector.py
index a9bbbdfd40..d559ea1aa0 100644
--- a/lib/ansible/modules/network/fortios/fortios_system_sdn_connector.py
+++ b/lib/ansible/modules/network/fortios/fortios_system_sdn_connector.py
@@ -450,19 +450,19 @@ def main():
"options": {
"state": {"required": True, "type": "str",
"choices": ["present", "absent"]},
- "access-key": {"required": False, "type": "str"},
+ "access-key": {"required": False, "type": "str", "no_log": True},
"azure-region": {"required": False, "type": "str",
"choices": ["global", "china", "germany",
"usgov"]},
"client-id": {"required": False, "type": "str"},
- "client-secret": {"required": False, "type": "str"},
+ "client-secret": {"required": False, "type": "str", "no_log": True},
"compartment-id": {"required": False, "type": "str"},
"external-ip": {"required": False, "type": "list",
"options": {
"name": {"required": True, "type": "str"}
}},
"gcp-project": {"required": False, "type": "str"},
- "key-passwd": {"required": False, "type": "str"},
+ "key-passwd": {"required": False, "type": "str", "no_log": True},
"name": {"required": True, "type": "str"},
"nic": {"required": False, "type": "list",
"options": {
@@ -478,8 +478,8 @@ def main():
"oci-region": {"required": False, "type": "str",
"choices": ["phoenix", "ashburn", "frankfurt",
"london"]},
- "password": {"required": False, "type": "str"},
- "private-key": {"required": False, "type": "str"},
+ "password": {"required": False, "type": "str", "no_log": True},
+ "private-key": {"required": False, "type": "str", "no_log": True},
"region": {"required": False, "type": "str"},
"resource-group": {"required": False, "type": "str"},
"route": {"required": False, "type": "list",
@@ -495,7 +495,7 @@ def main():
"next-hop": {"required": False, "type": "str"}
}}
}},
- "secret-key": {"required": False, "type": "str"},
+ "secret-key": {"required": False, "type": "str", "no_log": True},
"server": {"required": False, "type": "str"},
"server-port": {"required": False, "type": "int"},
"service-account": {"required": False, "type": "str"},
diff --git a/lib/ansible/modules/network/fortios/fortios_system_virtual_wan_link.py b/lib/ansible/modules/network/fortios/fortios_system_virtual_wan_link.py
index 7ececdaa36..f8e5350ffc 100644
--- a/lib/ansible/modules/network/fortios/fortios_system_virtual_wan_link.py
+++ b/lib/ansible/modules/network/fortios/fortios_system_virtual_wan_link.py
@@ -812,7 +812,7 @@ def main():
}},
"name": {"required": True, "type": "str"},
"packet-size": {"required": False, "type": "int"},
- "password": {"required": False, "type": "str"},
+ "password": {"required": False, "type": "str", "no_log": True},
"port": {"required": False, "type": "int"},
"protocol": {"required": False, "type": "str",
"choices": ["ping", "tcp-echo", "udp-echo",
diff --git a/lib/ansible/modules/network/fortios/fortios_user_radius.py b/lib/ansible/modules/network/fortios/fortios_user_radius.py
index 1b4f310466..d8b1334845 100644
--- a/lib/ansible/modules/network/fortios/fortios_user_radius.py
+++ b/lib/ansible/modules/network/fortios/fortios_user_radius.py
@@ -575,7 +575,7 @@ def main():
"options": {
"id": {"required": True, "type": "int"},
"port": {"required": False, "type": "int"},
- "secret": {"required": False, "type": "str"},
+ "secret": {"required": False, "type": "str", "no_log": True},
"server": {"required": False, "type": "str"},
"source-ip": {"required": False, "type": "str"},
"status": {"required": False, "type": "str",
@@ -637,11 +637,11 @@ def main():
"rsso-radius-response": {"required": False, "type": "str",
"choices": ["enable", "disable"]},
"rsso-radius-server-port": {"required": False, "type": "int"},
- "rsso-secret": {"required": False, "type": "str"},
+ "rsso-secret": {"required": False, "type": "str", "no_log": True},
"rsso-validate-request-secret": {"required": False, "type": "str",
"choices": ["enable", "disable"]},
"secondary-secret": {"required": False, "type": "str"},
- "secondary-server": {"required": False, "type": "str"},
+ "secondary-server": {"required": False, "type": "str", "no_log": True},
"secret": {"required": False, "type": "str"},
"server": {"required": False, "type": "str"},
"source-ip": {"required": False, "type": "str"},
@@ -657,7 +657,7 @@ def main():
"sso-attribute-key": {"required": False, "type": "str"},
"sso-attribute-value-override": {"required": False, "type": "str",
"choices": ["enable", "disable"]},
- "tertiary-secret": {"required": False, "type": "str"},
+ "tertiary-secret": {"required": False, "type": "str", "no_log": True},
"tertiary-server": {"required": False, "type": "str"},
"timeout": {"required": False, "type": "int"},
"use-management-vdom": {"required": False, "type": "str",
diff --git a/lib/ansible/modules/network/fortios/fortios_user_tacacsplus.py b/lib/ansible/modules/network/fortios/fortios_user_tacacsplus.py
index c24019b449..3f87ec01fd 100644
--- a/lib/ansible/modules/network/fortios/fortios_user_tacacsplus.py
+++ b/lib/ansible/modules/network/fortios/fortios_user_tacacsplus.py
@@ -292,14 +292,14 @@ def main():
"ascii", "auto"]},
"authorization": {"required": False, "type": "str",
"choices": ["enable", "disable"]},
- "key": {"required": False, "type": "str"},
+ "key": {"required": False, "type": "str", "no_log": True},
"name": {"required": True, "type": "str"},
"port": {"required": False, "type": "int"},
- "secondary-key": {"required": False, "type": "str"},
+ "secondary-key": {"required": False, "type": "str", "no_log": True},
"secondary-server": {"required": False, "type": "str"},
"server": {"required": False, "type": "str"},
"source-ip": {"required": False, "type": "str"},
- "tertiary-key": {"required": False, "type": "str"},
+ "tertiary-key": {"required": False, "type": "str", "no_log": True},
"tertiary-server": {"required": False, "type": "str"}
}
diff --git a/lib/ansible/modules/network/fortios/fortios_vpn_ipsec_manualkey.py b/lib/ansible/modules/network/fortios/fortios_vpn_ipsec_manualkey.py
index 615de35145..ca33de9986 100644
--- a/lib/ansible/modules/network/fortios/fortios_vpn_ipsec_manualkey.py
+++ b/lib/ansible/modules/network/fortios/fortios_vpn_ipsec_manualkey.py
@@ -307,8 +307,8 @@ def main():
"authentication": {"required": False, "type": "str",
"choices": ["null", "md5", "sha1",
"sha256", "sha384", "sha512"]},
- "authkey": {"required": False, "type": "str"},
- "enckey": {"required": False, "type": "str"},
+ "authkey": {"required": False, "type": "str", "no_log": True},
+ "enckey": {"required": False, "type": "str", "no_log": True},
"encryption": {"required": False, "type": "str",
"choices": ["null", "des"]},
"interface": {"required": False, "type": "str"},
diff --git a/lib/ansible/modules/network/fortios/fortios_vpn_ipsec_manualkey_interface.py b/lib/ansible/modules/network/fortios/fortios_vpn_ipsec_manualkey_interface.py
index 1a996070c1..5809a92ffb 100644
--- a/lib/ansible/modules/network/fortios/fortios_vpn_ipsec_manualkey_interface.py
+++ b/lib/ansible/modules/network/fortios/fortios_vpn_ipsec_manualkey_interface.py
@@ -332,10 +332,10 @@ def main():
"auth-alg": {"required": False, "type": "str",
"choices": ["null", "md5", "sha1",
"sha256", "sha384", "sha512"]},
- "auth-key": {"required": False, "type": "str"},
+ "auth-key": {"required": False, "type": "str", "no_log": True},
"enc-alg": {"required": False, "type": "str",
"choices": ["null", "des"]},
- "enc-key": {"required": False, "type": "str"},
+ "enc-key": {"required": False, "type": "str", "no_log": True},
"interface": {"required": False, "type": "str"},
"ip-version": {"required": False, "type": "str",
"choices": ["4", "6"]},
diff --git a/lib/ansible/modules/network/fortios/fortios_vpn_ipsec_phase1.py b/lib/ansible/modules/network/fortios/fortios_vpn_ipsec_phase1.py
index f0db4c6f97..f102d34862 100644
--- a/lib/ansible/modules/network/fortios/fortios_vpn_ipsec_phase1.py
+++ b/lib/ansible/modules/network/fortios/fortios_vpn_ipsec_phase1.py
@@ -924,7 +924,7 @@ def main():
"choices": ["psk", "signature"]},
"authmethod-remote": {"required": False, "type": "str",
"choices": ["psk", "signature"]},
- "authpasswd": {"required": False, "type": "str"},
+ "authpasswd": {"required": False, "type": "str", "no_log": True},
"authusr": {"required": False, "type": "str"},
"authusrgrp": {"required": False, "type": "str"},
"auto-negotiate": {"required": False, "type": "str",
@@ -977,7 +977,7 @@ def main():
"fragmentation-mtu": {"required": False, "type": "int"},
"group-authentication": {"required": False, "type": "str",
"choices": ["enable", "disable"]},
- "group-authentication-secret": {"required": False, "type": "password-3"},
+ "group-authentication-secret": {"required": False, "type": "password-3", "no_log": True},
"ha-sync-esp-seqno": {"required": False, "type": "str",
"choices": ["enable", "disable"]},
"idle-timeout": {"required": False, "type": "str",
@@ -1048,12 +1048,12 @@ def main():
"ppk": {"required": False, "type": "str",
"choices": ["disable", "allow", "require"]},
"ppk-identity": {"required": False, "type": "str"},
- "ppk-secret": {"required": False, "type": "password-3"},
+ "ppk-secret": {"required": False, "type": "password-3", "no_log": True},
"priority": {"required": False, "type": "int"},
"proposal": {"required": False, "type": "str",
"choices": ["des-md5", "des-sha1", "des-sha256",
"des-sha384", "des-sha512"]},
- "psksecret": {"required": False, "type": "password-3"},
+ "psksecret": {"required": False, "type": "password-3", "no_log": True},
"psksecret-remote": {"required": False, "type": "password-3"},
"reauth": {"required": False, "type": "str",
"choices": ["disable", "enable"]},
diff --git a/lib/ansible/modules/network/fortios/fortios_vpn_ipsec_phase1_interface.py b/lib/ansible/modules/network/fortios/fortios_vpn_ipsec_phase1_interface.py
index 546006b329..ad4187868f 100644
--- a/lib/ansible/modules/network/fortios/fortios_vpn_ipsec_phase1_interface.py
+++ b/lib/ansible/modules/network/fortios/fortios_vpn_ipsec_phase1_interface.py
@@ -1080,7 +1080,7 @@ def main():
"choices": ["psk", "signature"]},
"authmethod-remote": {"required": False, "type": "str",
"choices": ["psk", "signature"]},
- "authpasswd": {"required": False, "type": "str"},
+ "authpasswd": {"required": False, "type": "str", "no_log": True},
"authusr": {"required": False, "type": "str"},
"authusrgrp": {"required": False, "type": "str"},
"auto-discovery-forwarder": {"required": False, "type": "str",
@@ -1153,7 +1153,7 @@ def main():
"fragmentation-mtu": {"required": False, "type": "int"},
"group-authentication": {"required": False, "type": "str",
"choices": ["enable", "disable"]},
- "group-authentication-secret": {"required": False, "type": "password-3"},
+ "group-authentication-secret": {"required": False, "type": "password-3", "no_log": True},
"ha-sync-esp-seqno": {"required": False, "type": "str",
"choices": ["enable", "disable"]},
"idle-timeout": {"required": False, "type": "str",
@@ -1240,12 +1240,12 @@ def main():
"ppk": {"required": False, "type": "str",
"choices": ["disable", "allow", "require"]},
"ppk-identity": {"required": False, "type": "str"},
- "ppk-secret": {"required": False, "type": "password-3"},
+ "ppk-secret": {"required": False, "type": "password-3", "no_log": True},
"priority": {"required": False, "type": "int"},
"proposal": {"required": False, "type": "str",
"choices": ["des-md5", "des-sha1", "des-sha256",
"des-sha384", "des-sha512"]},
- "psksecret": {"required": False, "type": "password-3"},
+ "psksecret": {"required": False, "type": "password-3", "no_log": True},
"psksecret-remote": {"required": False, "type": "password-3"},
"reauth": {"required": False, "type": "str",
"choices": ["disable", "enable"]},
diff --git a/lib/ansible/modules/network/fortios/fortios_vpn_ssl_web_portal.py b/lib/ansible/modules/network/fortios/fortios_vpn_ssl_web_portal.py
index 84a89c0c15..fcdf78bc5c 100644
--- a/lib/ansible/modules/network/fortios/fortios_vpn_ssl_web_portal.py
+++ b/lib/ansible/modules/network/fortios/fortios_vpn_ssl_web_portal.py
@@ -911,7 +911,7 @@ def main():
"host": {"required": False, "type": "str"},
"listening-port": {"required": False, "type": "int"},
"load-balancing-info": {"required": False, "type": "str"},
- "logon-password": {"required": False, "type": "str"},
+ "logon-password": {"required": False, "type": "str", "no_log": True},
"logon-user": {"required": False, "type": "str"},
"name": {"required": True, "type": "str"},
"port": {"required": False, "type": "int"},
@@ -935,7 +935,7 @@ def main():
"sso-credential-sent-once": {"required": False, "type": "str",
"choices": ["enable", "disable"]},
"sso-password": {"required": False, "type": "str"},
- "sso-username": {"required": False, "type": "str"},
+ "sso-username": {"required": False, "type": "str", "no_log": True},
"url": {"required": False, "type": "str"}
}},
"name": {"required": True, "type": "str"}
diff --git a/lib/ansible/modules/network/fortios/fortios_wireless_controller_vap.py b/lib/ansible/modules/network/fortios/fortios_wireless_controller_vap.py
index 3168b7ca30..dc5ae61627 100644
--- a/lib/ansible/modules/network/fortios/fortios_wireless_controller_vap.py
+++ b/lib/ansible/modules/network/fortios/fortios_wireless_controller_vap.py
@@ -1074,9 +1074,9 @@ def main():
"netbios-ds", "ipv6", "all-other-mc",
"all-other-bc"]},
"captive-portal-ac-name": {"required": False, "type": "str"},
- "captive-portal-macauth-radius-secret": {"required": False, "type": "str"},
+ "captive-portal-macauth-radius-secret": {"required": False, "type": "str", "no_log": True},
"captive-portal-macauth-radius-server": {"required": False, "type": "str"},
- "captive-portal-radius-secret": {"required": False, "type": "str"},
+ "captive-portal-radius-secret": {"required": False, "type": "str", "no_log": True},
"captive-portal-radius-server": {"required": False, "type": "str"},
"captive-portal-session-timeout-interval": {"required": False, "type": "int"},
"dhcp-lease-time": {"required": False, "type": "int"},
@@ -1114,7 +1114,7 @@ def main():
"intra-vap-privacy": {"required": False, "type": "str",
"choices": ["enable", "disable"]},
"ip": {"required": False, "type": "str"},
- "key": {"required": False, "type": "str"},
+ "key": {"required": False, "type": "str", "no_log": True},
"keyindex": {"required": False, "type": "int"},
"ldpc": {"required": False, "type": "str",
"choices": ["disable", "rx", "tx",
@@ -1155,7 +1155,7 @@ def main():
"comment": {"required": False, "type": "str"},
"concurrent-clients": {"required": False, "type": "str"},
"key-name": {"required": True, "type": "str"},
- "passphrase": {"required": False, "type": "str"}
+ "passphrase": {"required": False, "type": "str", "no_log": True}
}},
"multicast-enhance": {"required": False, "type": "str",
"choices": ["enable", "disable"]},
@@ -1165,7 +1165,7 @@ def main():
"name": {"required": True, "type": "str"},
"okc": {"required": False, "type": "str",
"choices": ["disable", "enable"]},
- "passphrase": {"required": False, "type": "str"},
+ "passphrase": {"required": False, "type": "str", "no_log": True},
"pmf": {"required": False, "type": "str",
"choices": ["disable", "enable", "optional"]},
"pmf-assoc-comeback-timeout": {"required": False, "type": "int"},
diff --git a/lib/ansible/modules/network/fortios/fortios_wireless_controller_wtp.py b/lib/ansible/modules/network/fortios/fortios_wireless_controller_wtp.py
index 6844efa8c2..65fedbea55 100644
--- a/lib/ansible/modules/network/fortios/fortios_wireless_controller_wtp.py
+++ b/lib/ansible/modules/network/fortios/fortios_wireless_controller_wtp.py
@@ -873,7 +873,7 @@ def main():
"led-state": {"required": False, "type": "str",
"choices": ["enable", "disable"]},
"location": {"required": False, "type": "str"},
- "login-passwd": {"required": False, "type": "str"},
+ "login-passwd": {"required": False, "type": "str", "no_log": True},
"login-passwd-change": {"required": False, "type": "str",
"choices": ["yes", "default", "no"]},
"mesh-bridge-enable": {"required": False, "type": "str",
diff --git a/lib/ansible/modules/network/fortios/fortios_wireless_controller_wtp_profile.py b/lib/ansible/modules/network/fortios/fortios_wireless_controller_wtp_profile.py
index d84f0d38c4..c5ab706fd0 100644
--- a/lib/ansible/modules/network/fortios/fortios_wireless_controller_wtp_profile.py
+++ b/lib/ansible/modules/network/fortios/fortios_wireless_controller_wtp_profile.py
@@ -1560,7 +1560,7 @@ def main():
"fortipresence-project": {"required": False, "type": "str"},
"fortipresence-rogue": {"required": False, "type": "str",
"choices": ["enable", "disable"]},
- "fortipresence-secret": {"required": False, "type": "str"},
+ "fortipresence-secret": {"required": False, "type": "str", "no_log": True},
"fortipresence-server": {"required": False, "type": "str"},
"fortipresence-unassoc": {"required": False, "type": "str",
"choices": ["enable", "disable"]},
@@ -1575,7 +1575,7 @@ def main():
"choices": ["enable", "disable"]},
"lldp": {"required": False, "type": "str",
"choices": ["enable", "disable"]},
- "login-passwd": {"required": False, "type": "str"},
+ "login-passwd": {"required": False, "type": "str", "no_log": True},
"login-passwd-change": {"required": False, "type": "str",
"choices": ["yes", "default", "no"]},
"max-clients": {"required": False, "type": "int"},
diff --git a/lib/ansible/modules/network/ios/ios_ntp.py b/lib/ansible/modules/network/ios/ios_ntp.py
index 4fc886c643..195d9540c6 100644
--- a/lib/ansible/modules/network/ios/ios_ntp.py
+++ b/lib/ansible/modules/network/ios/ios_ntp.py
@@ -38,7 +38,7 @@ options:
default: False
auth_key:
description:
- - md5 NTP authentication key of tye 7.
+ - md5 NTP authentication key of type 7.
key_id:
description:
- auth_key id. Data type string
@@ -272,7 +272,7 @@ def main():
acl=dict(),
logging=dict(type='bool', default=False),
auth=dict(type='bool', default=False),
- auth_key=dict(),
+ auth_key=dict(no_log=True),
key_id=dict(),
state=dict(choices=['absent', 'present'], default='present')
)
diff --git a/lib/ansible/modules/network/netscaler/netscaler_lb_monitor.py b/lib/ansible/modules/network/netscaler/netscaler_lb_monitor.py
index 702ab58e24..1b6c6e0237 100644
--- a/lib/ansible/modules/network/netscaler/netscaler_lb_monitor.py
+++ b/lib/ansible/modules/network/netscaler/netscaler_lb_monitor.py
@@ -982,8 +982,8 @@ def main():
dispatcherip=dict(type='str'),
dispatcherport=dict(type='int'),
username=dict(type='str'),
- password=dict(type='str'),
- secondarypassword=dict(type='str'),
+ password=dict(type='str', no_log=True),
+ secondarypassword=dict(type='str', no_log=True),
logonpointname=dict(type='str'),
lasversion=dict(type='str'),
radkey=dict(type='str', no_log=True),
diff --git a/lib/ansible/modules/network/nxos/nxos_aaa_server_host.py b/lib/ansible/modules/network/nxos/nxos_aaa_server_host.py
index e9aa8e2a93..8e1fe8cff3 100644
--- a/lib/ansible/modules/network/nxos/nxos_aaa_server_host.py
+++ b/lib/ansible/modules/network/nxos/nxos_aaa_server_host.py
@@ -246,7 +246,7 @@ def main():
argument_spec = dict(
server_type=dict(choices=['radius', 'tacacs'], required=True),
address=dict(type='str', required=True),
- key=dict(type='str'),
+ key=dict(type='str', no_log=True),
encrypt_type=dict(type='str', choices=['0', '7']),
host_timeout=dict(type='str'),
auth_port=dict(type='str'),
diff --git a/lib/ansible/modules/notification/logentries_msg.py b/lib/ansible/modules/notification/logentries_msg.py
index 51ba941992..17fb6f2730 100644
--- a/lib/ansible/modules/notification/logentries_msg.py
+++ b/lib/ansible/modules/notification/logentries_msg.py
@@ -73,7 +73,7 @@ def send_msg(module, token, msg, api, port):
def main():
module = AnsibleModule(
argument_spec=dict(
- token=dict(type='str', required=True),
+ token=dict(type='str', required=True, no_log=True),
msg=dict(type='str', required=True),
api=dict(type='str', default="data.logentries.com"),
port=dict(type='int', default=80)),
diff --git a/lib/ansible/modules/storage/netapp/na_elementsw_cluster_snmp.py b/lib/ansible/modules/storage/netapp/na_elementsw_cluster_snmp.py
index a97e053125..ee70e81d0a 100644
--- a/lib/ansible/modules/storage/netapp/na_elementsw_cluster_snmp.py
+++ b/lib/ansible/modules/storage/netapp/na_elementsw_cluster_snmp.py
@@ -177,8 +177,8 @@ class ElementSWClusterSnmp(object):
options=dict(
access=dict(type='str', choices=['rouser', 'rwuser', 'rosys']),
name=dict(type='str', default=None),
- password=dict(type='str', default=None),
- passphrase=dict(type='str', default=None),
+ password=dict(type='str', default=None, no_log=True),
+ passphrase=dict(type='str', default=None, no_log=True),
secLevel=dict(type='str', choices=['auth', 'noauth', 'priv'])
)
),
diff --git a/lib/ansible/modules/web_infrastructure/ansible_tower/tower_credential.py b/lib/ansible/modules/web_infrastructure/ansible_tower/tower_credential.py
index a8bdd1e5b5..6ee01045ae 100644
--- a/lib/ansible/modules/web_infrastructure/ansible_tower/tower_credential.py
+++ b/lib/ansible/modules/web_infrastructure/ansible_tower/tower_credential.py
@@ -245,8 +245,8 @@ def main():
authorize=dict(type='bool', default=False),
authorize_password=dict(no_log=True),
client=dict(),
- security_token=dict(),
- secret=dict(),
+ security_token=dict(no_log=True),
+ secret=dict(no_log=True),
tenant=dict(),
subscription=dict(),
domain=dict(),