Python 2 support has been dropped in Salt 3001. See https://community.saltstack.com/blog/sunsetting-python-2-support/ for more info.
The syntax for defining salt functions in config or pillar files has changed to
also support the syntax used in module.run
.
The old syntax for the mine_function - as a dict, or as a list with dicts that
contain more than exactly one key - is still supported but discouraged in favor
of the more uniform syntax of module.run.
The creates
state requisite has been migrated from the
docker_container
and cmd
states to become a global option. This acts similar to an equivalent
unless: test -f filename
but can also accept a list of filenames. This allows
all states to take advantage of the enhanced functionality released in Neon, of allowing
salt execution modules for requisite checks.
When using salt functions onlyif
or unless
requisites, a get_return
key can
now be used to specify a key to evaluate for truthiness. This can be used for execution modules
which return status in a nested key.
test: test.nop: - name: foo - onlyif: - fun: consul.get consul_url: http://127.0.0.1:8500 key: not-existing get_return: res
The state.test
function
can be used to test a state on a minion. This works by executing the
state.apply
function while forcing the test
kwarg
to True
so that the state.apply
function is not required to be called by the
user directly. This also allows you to add the state.test
function to a minion's
minion_blackout_whitelist
pillar if you wish to be able to test a state while a
minion is in blackout.
This grain provides the same information as the path
grain, only formatted
as a list of directories.
A new Salt-SSH roster option ssh_pre_flight
has been added. This enables you to run a
script before Salt-SSH tries to run any commands. You can set this option in the roster
for a specific minion or use the roster_defaults
to set it for all minions.
Example for setting ssh_pre_flight
for specific host in roster file
minion1:
host: localhost
user: root
passwd: P@ssword
ssh_pre_flight: /srv/salt/pre_flight.sh
Example for setting ssh_pre_flight
using roster_defaults, so all minions
run this script.
roster_defaults:
ssh_pre_flight: /srv/salt/pre_flight.sh
The ssh_pre_flight
script will only run if the thin dir is not currently on the
minion. If you want to force the script to run you have the following options:
Wipe the thin dir on the targeted minion using the -w arg.
Set ssh_run_pre_flight to True in the config.
Run salt-ssh with the --pre-flight arg.
A new salt-ssh roster option set_path has been added. This allows you to set the path environment variable used to run the salt-ssh command on the target minion. You can set this setting in your roster file like so:
minion1:
host: localhost
user: root
passwd: P@ssword
set_path: '$PATH:/usr/local/bin/'
You can now auto detect the dependencies to be packed into the salt thin when using
the ssh_ext_alternatives
feature.
ssh_ext_alternatives:
2019.2: # Namespace, can be anything.
py-version: [2, 7] # Constraint to specific interpreter version
path: /opt/2019.2/salt # Main Salt installation directory.
auto_detect: True # Auto detect dependencies
py_bin: /usr/bin/python2.7 # Python binary path used to auto detect dependencies
This new auto_detect
option needs to be set to True in your ssh_ext_alternatives
configuration.
Salt-ssh will attempt to auto detect the file paths required for the default dependencies to include
in the thin. If you have a dependency already set in your configuration, it will not attempt to auto
detect for that dependency.
You can also set the py_bin
option to set the python binary to be used to auto detect the
dependencies. If py_bin
is not set, it will attempt to use the major Python version set in
py-version
. For example, if you set py-version
to be [2, 7]
it will attempt to find and
use the python2
binary.
Adding a new option for the State compiler, disabled_requisites
will allow
requisites to be disabled during State runs.
A new renderer for toml files has been added.
#!jinja|toml
{% set myvar = "sometext" %}
[["some id"."test.nop"]]
name = "{{ myvar }}"
[["some id"."test.nop"]]
txt = "hello"
[["some id"."test.nop"]]
"somekey" = "somevalue"
The vault module
has been updated with the ability
to cache generated tokens. By specifying uses
and optionally ttl
, the token generated on
behalf of the minion will be allowed to persist and function for the defined time period
or number of uses. Setting uses: 0
creates an unlimited use token, that is only constrained by
the ttl
.
vault:
auth:
uses: 25
This functionality is configured by default on the master and is thus shared behavior for all minion token generation.
To delegate use count to individual minions, specify allow_minion_override: True
in the master config, and define
uses
and ttl
in the minion config as directed above.
vault:
auth:
method: token
allow_minion_override: True
Additionally, the vault module now supports Vault secrets backend version 2. The approperate secrets backend will be
automatically detected, and cached in the same credentials file as long lived vault tokens mentioned above. For any
configurations that worked around KV v2 handling by adding a manual data key to the end of vault lookups,
salt['vault'].read_secret('secret/my/secret')['data']
, these are automatically detected and will continue to
function, but will generate a debug log message and can be removed.
The long lived token and secret metadata cache file can be cleared with the new vault.clear_token_cache
execution function.