diff --git a/CHANGELOG.md b/CHANGELOG.md
index 7bdff07d..f23ccdd5 100644
--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -2,271 +2,342 @@
**Topics**
-- v2\.26\.1
+- v3\.0\.0\-a1
- Release Summary
+ - Minor Changes
+ - Breaking Changes / Porting Guide
+ - Deprecated Features
+ - Removed Features \(previously deprecated\)
+- v2\.26\.1
+ - Release Summary
- Bugfixes
- v2\.26\.0
- - Release Summary
- - Minor Changes
-- v2\.25\.0
- Release Summary
- Minor Changes
-- v2\.24\.0
+- v2\.25\.0
- Release Summary
- Minor Changes
- - Deprecated Features
- - Bugfixes
- - New Modules
-- v2\.23\.0
+- v2\.24\.0
- Release Summary
- Minor Changes
- Deprecated Features
-- v2\.22\.3
+ - Bugfixes
+ - New Modules
+- v2\.23\.0
- Release Summary
+ - Minor Changes
+ - Deprecated Features
+- v2\.22\.3
+ - Release Summary
- Bugfixes
- v2\.22\.2
- - Release Summary
+ - Release Summary
- Bugfixes
- v2\.22\.1
- - Release Summary
+ - Release Summary
- Bugfixes
- v2\.22\.0
- - Release Summary
- - Minor Changes
-- v2\.21\.1
- Release Summary
+ - Minor Changes
+- v2\.21\.1
+ - Release Summary
- Bugfixes
- v2\.21\.0
- - Release Summary
- - Minor Changes
-- v2\.20\.0
- Release Summary
- Minor Changes
- - Deprecated Features
+- v2\.20\.0
+ - Release Summary
+ - Minor Changes
+ - Deprecated Features
- Bugfixes
- New Modules
- v2\.19\.1
- - Release Summary
+ - Release Summary
- Bugfixes
- v2\.19\.0
- - Release Summary
- - Minor Changes
- - Deprecated Features
- - Bugfixes
- - New Modules
-- v2\.18\.0
- Release Summary
- Minor Changes
- Deprecated Features
+ - Bugfixes
+ - New Modules
+- v2\.18\.0
+ - Release Summary
+ - Minor Changes
+ - Deprecated Features
- Bugfixes
- New Plugins
- Filter
- v2\.17\.1
- - Release Summary
+ - Release Summary
- Bugfixes
- v2\.17\.0
- - Release Summary
- - Minor Changes
-- v2\.16\.2
- Release Summary
+ - Minor Changes
+- v2\.16\.2
+ - Release Summary
- Bugfixes
- v2\.16\.1
- - Release Summary
+ - Release Summary
- Bugfixes
- v2\.16\.0
- - Release Summary
- - Minor Changes
+ - Release Summary
+ - Minor Changes
- Bugfixes
- v2\.15\.1
- - Release Summary
+ - Release Summary
- Bugfixes
- v2\.15\.0
- - Release Summary
- - Minor Changes
- - Deprecated Features
+ - Release Summary
+ - Minor Changes
+ - Deprecated Features
- Bugfixes
- New Plugins
- Filter
- Lookup
- v2\.14\.1
- - Release Summary
+ - Release Summary
- Bugfixes
- Known Issues
- v2\.14\.0
- - Release Summary
- - Minor Changes
-- v2\.13\.1
- Release Summary
+ - Minor Changes
+- v2\.13\.1
+ - Release Summary
- Bugfixes
- v2\.13\.0
- - Release Summary
- - Minor Changes
- - Deprecated Features
- - Bugfixes
-- v2\.12\.0
- Release Summary
- Minor Changes
-- v2\.11\.1
+ - Deprecated Features
+ - Bugfixes
+- v2\.12\.0
- Release Summary
-- v2\.11\.0
- - Release Summary
- Minor Changes
+- v2\.11\.1
+ - Release Summary
+- v2\.11\.0
+ - Release Summary
+ - Minor Changes
- Bugfixes
- v2\.10\.0
- - Release Summary
+ - Release Summary
- Bugfixes
- New Plugins
- Filter
- v2\.9\.0
- - Release Summary
- - Minor Changes
-- v2\.8\.1
- Release Summary
-- v2\.8\.0
- - Release Summary
- Minor Changes
-- v2\.7\.1
+- v2\.8\.1
+ - Release Summary
+- v2\.8\.0
- Release Summary
+ - Minor Changes
+- v2\.7\.1
+ - Release Summary
- Bugfixes
- v2\.7\.0
- - Release Summary
- - Minor Changes
- - Bugfixes
-- v2\.6\.0
- Release Summary
- Minor Changes
-- v2\.5\.0
+ - Bugfixes
+- v2\.6\.0
- Release Summary
- Minor Changes
-- v2\.4\.0
+- v2\.5\.0
- Release Summary
- - Deprecated Features
+ - Minor Changes
+- v2\.4\.0
+ - Release Summary
+ - Deprecated Features
- Bugfixes
- v2\.3\.4
- - Release Summary
-- v2\.3\.3
- Release Summary
+- v2\.3\.3
+ - Release Summary
- Bugfixes
- v2\.3\.2
- - Release Summary
+ - Release Summary
- Bugfixes
- v2\.3\.1
- - Release Summary
+ - Release Summary
- Bugfixes
- v2\.3\.0
- - Release Summary
- - Minor Changes
+ - Release Summary
+ - Minor Changes
- Bugfixes
- v2\.2\.4
- - Release Summary
+ - Release Summary
- Bugfixes
- v2\.2\.3
- - Release Summary
+ - Release Summary
- Bugfixes
- v2\.2\.2
- - Release Summary
+ - Release Summary
- Bugfixes
- v2\.2\.1
- - Release Summary
+ - Release Summary
- Bugfixes
- v2\.2\.0
- - Release Summary
- - Minor Changes
- - Bugfixes
-- v2\.1\.0
- Release Summary
- Minor Changes
+ - Bugfixes
+- v2\.1\.0
+ - Release Summary
+ - Minor Changes
- Bugfixes
- New Modules
- v2\.0\.2
- - Release Summary
-- v2\.0\.1
- Release Summary
- - Minor Changes
- - Bugfixes
-- v2\.0\.0
+- v2\.0\.1
- Release Summary
- Minor Changes
- - Breaking Changes / Porting Guide
- - Deprecated Features
- - Removed Features \(previously deprecated\)
+ - Bugfixes
+- v2\.0\.0
+ - Release Summary
+ - Minor Changes
+ - Breaking Changes / Porting Guide
+ - Deprecated Features
+ - Removed Features \(previously deprecated\)
- Bugfixes
- v1\.9\.4
- - Release Summary
+ - Release Summary
- Bugfixes
- v1\.9\.3
- - Release Summary
+ - Release Summary
- Bugfixes
- v1\.9\.2
- - Release Summary
-- v1\.9\.1
- Release Summary
-- v1\.9\.0
+- v1\.9\.1
- Release Summary
- - Minor Changes
- - Bugfixes
-- v1\.8\.0
+- v1\.9\.0
- Release Summary
- Minor Changes
+ - Bugfixes
+- v1\.8\.0
+ - Release Summary
+ - Minor Changes
- Bugfixes
- v1\.7\.1
- - Release Summary
+ - Release Summary
- Bugfixes
- v1\.7\.0
- - Release Summary
- - Minor Changes
+ - Release Summary
+ - Minor Changes
- Bugfixes
- New Modules
- v1\.6\.2
- - Release Summary
+ - Release Summary
- Bugfixes
- v1\.6\.1
- - Release Summary
+ - Release Summary
- Bugfixes
- v1\.6\.0
- - Release Summary
- - Minor Changes
- - Deprecated Features
- - Bugfixes
-- v1\.5\.0
- Release Summary
- Minor Changes
- Deprecated Features
- - Bugfixes
-- v1\.4\.0
+ - Bugfixes
+- v1\.5\.0
- Release Summary
- Minor Changes
- - Bugfixes
-- v1\.3\.0
+ - Deprecated Features
+ - Bugfixes
+- v1\.4\.0
- Release Summary
- Minor Changes
+ - Bugfixes
+- v1\.3\.0
+ - Release Summary
+ - Minor Changes
- Bugfixes
- New Modules
- v1\.2\.0
- - Release Summary
- - Minor Changes
+ - Release Summary
+ - Minor Changes
- Security Fixes
- Bugfixes
- v1\.1\.1
- - Release Summary
+ - Release Summary
- Bugfixes
- v1\.1\.0
- - Release Summary
- - Minor Changes
+ - Release Summary
+ - Minor Changes
- Bugfixes
- New Modules
- v1\.0\.0
- - Release Summary
- - Minor Changes
- - Deprecated Features
- - Removed Features \(previously deprecated\)
+ - Release Summary
+ - Minor Changes
+ - Deprecated Features
+ - Removed Features \(previously deprecated\)
- Bugfixes
- New Modules
+
+## v3\.0\.0\-a1
+
+
+### Release Summary
+
+First pre\-release for community\.crypto 3\.0\.0\.
+This release drops compatibility for ansible\-core before 2\.17\, for Python before 3\.7\, and for cryptography before 3\.3\.
+
+
+### Minor Changes
+
+* No longer provide cryptography\'s backend parameter\. This will break with cryptography \< 3\.1 \([https\://github\.com/ansible\-collections/community\.crypto/pull/878](https\://github\.com/ansible\-collections/community\.crypto/pull/878)\)\.
+* On cryptography 36\.0\.0\+\, always use public\_bytes\(\) for X\.509 extension objects instead of using cryptography internals to obtain DER value of extension \([https\://github\.com/ansible\-collections/community\.crypto/pull/878](https\://github\.com/ansible\-collections/community\.crypto/pull/878)\)\.
+* Python code modernization\: add type hints and type checking \([https\://github\.com/ansible\-collections/community\.crypto/pull/885](https\://github\.com/ansible\-collections/community\.crypto/pull/885)\)\.
+* Python code modernization\: avoid unnecessary string conversion \([https\://github\.com/ansible\-collections/community\.crypto/pull/880](https\://github\.com/ansible\-collections/community\.crypto/pull/880)\)\.
+* Python code modernization\: avoid using six \([https\://github\.com/ansible\-collections/community\.crypto/pull/884](https\://github\.com/ansible\-collections/community\.crypto/pull/884)\)\.
+* Python code modernization\: remove Python 3 specific code \([https\://github\.com/ansible\-collections/community\.crypto/pull/877](https\://github\.com/ansible\-collections/community\.crypto/pull/877)\)\.
+* Python code modernization\: update \_\_future\_\_ imports\, remove Python 2 specific boilerplates \([https\://github\.com/ansible\-collections/community\.crypto/pull/876](https\://github\.com/ansible\-collections/community\.crypto/pull/876)\)\.
+* Python code modernization\: use unittest\.mock instead of ansible\_collections\.community\.internal\_test\_tools\.tests\.unit\.compat\.mock \([https\://github\.com/ansible\-collections/community\.crypto/pull/881](https\://github\.com/ansible\-collections/community\.crypto/pull/881)\)\.
+* Python code modernization\: use f\-strings instead of \% and str\.format\(\) \([https\://github\.com/ansible\-collections/community\.crypto/pull/875](https\://github\.com/ansible\-collections/community\.crypto/pull/875)\)\.
+* Remove backend parameter from internal code whenever possible \([https\://github\.com/ansible\-collections/community\.crypto/pull/883](https\://github\.com/ansible\-collections/community\.crypto/pull/883)\)\.
+* Remove various compatibility code for cryptography \< 3\.3 \([https\://github\.com/ansible\-collections/community\.crypto/pull/878](https\://github\.com/ansible\-collections/community\.crypto/pull/878)\)\.
+* Remove vendored copy of distutils\.version in favor of vendored copy included with ansible\-core 2\.12\+ \([https\://github\.com/ansible\-collections/community\.crypto/pull/371](https\://github\.com/ansible\-collections/community\.crypto/pull/371)\)\.
+* acme\_\* modules \- improve parsing of Retry\-After reply headers in regular ACME requests \([https\://github\.com/ansible\-collections/community\.crypto/pull/890](https\://github\.com/ansible\-collections/community\.crypto/pull/890)\)\.
+* action\_module plugin utils \- remove compatibility with older ansible\-core/ansible\-base/Ansible versions \([https\://github\.com/ansible\-collections/community\.crypto/pull/872](https\://github\.com/ansible\-collections/community\.crypto/pull/872)\)\.
+* x509\_certificate\, x509\_certificate\_pipe \- the ownca\_version and selfsigned\_version parameters explicitly only allow the value 3\. The module already failed for other values in the past\, now this is validated as part of the module argument spec \([https\://github\.com/ansible\-collections/community\.crypto/pull/890](https\://github\.com/ansible\-collections/community\.crypto/pull/890)\)\.
+
+
+### Breaking Changes / Porting Guide
+
+* All doc\_fragments are now private to the collection and must not be used from other collections or unrelated plugins/modules\. Breaking changes in these can happen at any time\, even in bugfix releases \([https\://github\.com/ansible\-collections/community\.crypto/pull/898](https\://github\.com/ansible\-collections/community\.crypto/pull/898)\)\.
+* All module\_utils and plugin\_utils are now private to the collection and must not be used from other collections or unrelated plugins/modules\. Breaking changes in these can happen at any time\, even in bugfix releases \([https\://github\.com/ansible\-collections/community\.crypto/pull/887](https\://github\.com/ansible\-collections/community\.crypto/pull/887)\)\.
+* Ignore value of select\_crypto\_backend for all modules except acme\_\* and \.\.\.\, and always assume the value auto\. This ensures that the cryptography version is always checked \([https\://github\.com/ansible\-collections/community\.crypto/pull/883](https\://github\.com/ansible\-collections/community\.crypto/pull/883)\)\.
+* The validation for relative timestamps is now more strict\. A string starting with \+ or \- must be valid\, otherwise validation will fail\. In the past such strings were often silently ignored\, and in many cases the code which triggered the validation was not able to handle no result \([https\://github\.com/ansible\-collections/community\.crypto/pull/885](https\://github\.com/ansible\-collections/community\.crypto/pull/885)\)\.
+* acme\.certificates module utils \- the retrieve\_acme\_v1\_certificate\(\) helper function has been removed \([https\://github\.com/ansible\-collections/community\.crypto/pull/873](https\://github\.com/ansible\-collections/community\.crypto/pull/873)\)\.
+* get\_certificate \- the default for asn1\_base64 changed from false to true \([https\://github\.com/ansible\-collections/community\.crypto/pull/873](https\://github\.com/ansible\-collections/community\.crypto/pull/873)\)\.
+* x509\_crl \- the mode parameter no longer denotes the update mode\, but the CRL file mode\. Use crl\_mode instead for the update mode \([https\://github\.com/ansible\-collections/community\.crypto/pull/873](https\://github\.com/ansible\-collections/community\.crypto/pull/873)\)\.
+
+
+### Deprecated Features
+
+* acme\_certificate \- deprecate the agreement option which has no more effect\. It will be removed from community\.crypto 4\.0\.0 \([https\://github\.com/ansible\-collections/community\.crypto/pull/891](https\://github\.com/ansible\-collections/community\.crypto/pull/891)\)\.
+* openssl\_pkcs12 \- deprecate the maciter\_size option which has no more effect\. It will be removed from community\.crypto 4\.0\.0 \([https\://github\.com/ansible\-collections/community\.crypto/pull/891](https\://github\.com/ansible\-collections/community\.crypto/pull/891)\)\.
+
+
+### Removed Features \(previously deprecated\)
+
+* The collection no longer supports cryptography \< 3\.3 \([https\://github\.com/ansible\-collections/community\.crypto/pull/878](https\://github\.com/ansible\-collections/community\.crypto/pull/878)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/882](https\://github\.com/ansible\-collections/community\.crypto/pull/882)\)\.
+* acme\.acme module utils \- the get\_default\_argspec\(\) function has been removed\. Use create\_default\_argspec\(\) instead \([https\://github\.com/ansible\-collections/community\.crypto/pull/873](https\://github\.com/ansible\-collections/community\.crypto/pull/873)\)\.
+* acme\.backends module utils \- the methods get\_ordered\_csr\_identifiers\(\) and get\_cert\_information\(\) of CryptoBackend now must be implemented \([https\://github\.com/ansible\-collections/community\.crypto/pull/873](https\://github\.com/ansible\-collections/community\.crypto/pull/873)\)\.
+* acme\.documentation docs fragment \- the documentation docs fragment has been removed\. Use both the basic and account docs fragments in acme instead \([https\://github\.com/ansible\-collections/community\.crypto/pull/873](https\://github\.com/ansible\-collections/community\.crypto/pull/873)\)\.
+* acme\_\* modules \- support for ACME v1 has been removed \([https\://github\.com/ansible\-collections/community\.crypto/pull/873](https\://github\.com/ansible\-collections/community\.crypto/pull/873)\)\.
+* community\.crypto no longer supports Ansible 2\.9\, ansible\-base 2\.10\, and ansible\-core versions 2\.11\, 2\.12\, 2\.13\, 2\.14\, 2\.15\, and 2\.16\. While content from this collection might still work with some older versions of ansible\-core\, it will not work with any Python version before 3\.7 \([https\://github\.com/ansible\-collections/community\.crypto/pull/870](https\://github\.com/ansible\-collections/community\.crypto/pull/870)\)\.
+* crypto\.basic module utils \- remove CRYPTOGRAPHY\_HAS\_\* flags\. All tested features are supported since cryptography 3\.0 \([https\://github\.com/ansible\-collections/community\.crypto/pull/878](https\://github\.com/ansible\-collections/community\.crypto/pull/878)\)\.
+* crypto\.cryptography\_support module utils \- remove cryptography\_serial\_number\_of\_cert\(\) helper function \([https\://github\.com/ansible\-collections/community\.crypto/pull/878](https\://github\.com/ansible\-collections/community\.crypto/pull/878)\)\.
+* crypto\.module\_backends\.common module utils \- this module utils has been removed\. Use the argspec module utils instead \([https\://github\.com/ansible\-collections/community\.crypto/pull/873](https\://github\.com/ansible\-collections/community\.crypto/pull/873)\)\.
+* crypto\.support module utils \- remove pyopenssl backend \([https\://github\.com/ansible\-collections/community\.crypto/pull/874](https\://github\.com/ansible\-collections/community\.crypto/pull/874)\)\.
+* execution environment dependencies \- remove PyOpenSSL dependency \([https\://github\.com/ansible\-collections/community\.crypto/pull/874](https\://github\.com/ansible\-collections/community\.crypto/pull/874)\)\.
+* openssl\_csr\_pipe \- the module now ignores check mode and will always behave as if check mode is not active \([https\://github\.com/ansible\-collections/community\.crypto/pull/873](https\://github\.com/ansible\-collections/community\.crypto/pull/873)\)\.
+* openssl\_pkcs12 \- support for the pyopenssl backend has been removed \([https\://github\.com/ansible\-collections/community\.crypto/pull/873](https\://github\.com/ansible\-collections/community\.crypto/pull/873)\)\.
+* openssl\_privatekey\_pipe \- the module now ignores check mode and will always behave as if check mode is not active \([https\://github\.com/ansible\-collections/community\.crypto/pull/873](https\://github\.com/ansible\-collections/community\.crypto/pull/873)\)\.
+* time module utils \- remove pyopenssl backend \([https\://github\.com/ansible\-collections/community\.crypto/pull/874](https\://github\.com/ansible\-collections/community\.crypto/pull/874)\)\.
+* x509\_certificate\_pipe \- the module now ignores check mode and will always behave as if check mode is not active \([https\://github\.com/ansible\-collections/community\.crypto/pull/873](https\://github\.com/ansible\-collections/community\.crypto/pull/873)\)\.
+
## v2\.26\.1
-
+
### Release Summary
Bugfix and maintenance release with improved CI\.
@@ -280,19 +351,6 @@ Bugfix and maintenance release with improved CI\.
## v2\.26\.0
-
-### Release Summary
-
-Feature release\.
-
-
-### Minor Changes
-
-* openssl\_pkcs12 \- the module now supports certificate\_content/other\_certificates\_content for cases where the data already exists in memory and not yet in a file \([https\://github\.com/ansible\-collections/community\.crypto/issues/847](https\://github\.com/ansible\-collections/community\.crypto/issues/847)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/848](https\://github\.com/ansible\-collections/community\.crypto/pull/848)\)\.
-
-
-## v2\.25\.0
-
### Release Summary
@@ -301,24 +359,37 @@ Feature release\.
### Minor Changes
+* openssl\_pkcs12 \- the module now supports certificate\_content/other\_certificates\_content for cases where the data already exists in memory and not yet in a file \([https\://github\.com/ansible\-collections/community\.crypto/issues/847](https\://github\.com/ansible\-collections/community\.crypto/issues/847)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/848](https\://github\.com/ansible\-collections/community\.crypto/pull/848)\)\.
+
+
+## v2\.25\.0
+
+
+### Release Summary
+
+Feature release\.
+
+
+### Minor Changes
+
* luks\_device \- allow passphrases to contain newlines \([https\://github\.com/ansible\-collections/community\.crypto/pull/844](https\://github\.com/ansible\-collections/community\.crypto/pull/844)\)\.
## v2\.24\.0
-
+
### Release Summary
New feature and bugfix release with multiple new modules\. It also deprecates support for older ansible\-core and Python versions\.
-
+
### Minor Changes
* acme\_certificate \- add options order\_creation\_error\_strategy and order\_creation\_max\_retries which allow to configure the error handling behavior if creating a new ACME order fails\. This is particularly important when using the include\_renewal\_cert\_id option\, and the default value auto for order\_creation\_error\_strategy tries to gracefully handle related errors \([https\://github\.com/ansible\-collections/community\.crypto/pull/842](https\://github\.com/ansible\-collections/community\.crypto/pull/842)\)\.
* acme\_certificate \- allow to chose a profile for certificate generation\, in case the CA supports this using Internet\-Draft [draft\-aaron\-acme\-profiles](https\://datatracker\.ietf\.org/doc/draft\-aaron\-acme\-profiles/) \([https\://github\.com/ansible\-collections/community\.crypto/pull/835](https\://github\.com/ansible\-collections/community\.crypto/pull/835)\)\.
* acme\_certificate\_renewal\_info \- add exists and parsable return values and treat\_parsing\_error\_as\_non\_existing option \([https\://github\.com/ansible\-collections/community\.crypto/pull/838](https\://github\.com/ansible\-collections/community\.crypto/pull/838)\)\.
-
+
### Deprecated Features
* Support for ansible\-core 2\.11\, 2\.12\, 2\.13\, 2\.14\, 2\.15\, and 2\.16 is deprecated\, and will be removed in the next major release \(community\.crypto 3\.0\.0\)\. Some modules might still work with some of these versions afterwards\, but we will no longer keep compatibility code that was needed to support them\. Note that this means that support for all Python versions before 3\.7 will be dropped\, also on the target side \([https\://github\.com/ansible\-collections/community\.crypto/issues/559](https\://github\.com/ansible\-collections/community\.crypto/issues/559)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/839](https\://github\.com/ansible\-collections/community\.crypto/pull/839)\)\.
@@ -340,19 +411,19 @@ New feature and bugfix release with multiple new modules\. It also deprecates su
## v2\.23\.0
-
+
### Release Summary
Feature release\.
-
+
### Minor Changes
* acme\_certificate \- add compatibility for ACME CAs that are not fully RFC8555 compliant and do not provide challenges in authz objects \([https\://github\.com/ansible\-collections/community\.crypto/issues/824](https\://github\.com/ansible\-collections/community\.crypto/issues/824)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/832](https\://github\.com/ansible\-collections/community\.crypto/pull/832)\)\.
* luks\_device \- allow to provide passphrases base64\-encoded \([https\://github\.com/ansible\-collections/community\.crypto/issues/827](https\://github\.com/ansible\-collections/community\.crypto/issues/827)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/829](https\://github\.com/ansible\-collections/community\.crypto/pull/829)\)\.
* x509\_certificate\_convert \- add new option verify\_cert\_parsable which allows to check whether the certificate can actually be parsed \([https\://github\.com/ansible\-collections/community\.crypto/issues/809](https\://github\.com/ansible\-collections/community\.crypto/issues/809)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/830](https\://github\.com/ansible\-collections/community\.crypto/pull/830)\)\.
-
+
### Deprecated Features
* openssl\_pkcs12 \- the PyOpenSSL based backend is deprecated and will be removed from community\.crypto 3\.0\.0\. From that point on you need cryptography 3\.0 or newer to use this module \([https\://github\.com/ansible\-collections/community\.crypto/issues/667](https\://github\.com/ansible\-collections/community\.crypto/issues/667)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/831](https\://github\.com/ansible\-collections/community\.crypto/pull/831)\)\.
@@ -360,7 +431,7 @@ Feature release\.
## v2\.22\.3
-
+
### Release Summary
Bugfix release\.
@@ -374,7 +445,7 @@ Bugfix release\.
## v2\.22\.2
-
+
### Release Summary
Bugfix release\.
@@ -387,7 +458,7 @@ Bugfix release\.
## v2\.22\.1
-
+
### Release Summary
Bugfix release\.
@@ -401,12 +472,12 @@ Bugfix release\.
## v2\.22\.0
-
+
### Release Summary
Feature release\.
-
+
### Minor Changes
* openssl\_privatekey\, openssl\_privatekey\_pipe \- add default value auto for cipher option\, which happens to be the only supported value for this option anyway\. Therefore it is no longer necessary to specify cipher\=auto when providing passphrase \([https\://github\.com/ansible\-collections/community\.crypto/issues/793](https\://github\.com/ansible\-collections/community\.crypto/issues/793)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/794](https\://github\.com/ansible\-collections/community\.crypto/pull/794)\)\.
@@ -414,7 +485,7 @@ Feature release\.
## v2\.21\.1
-
+
### Release Summary
Maintenance release\.
@@ -427,12 +498,12 @@ Maintenance release\.
## v2\.21\.0
-
+
### Release Summary
Feature release\.
-
+
### Minor Changes
* certificate\_complete\_chain \- add ability to identify Ed25519 and Ed448 complete chains \([https\://github\.com/ansible\-collections/community\.crypto/pull/777](https\://github\.com/ansible\-collections/community\.crypto/pull/777)\)\.
@@ -442,7 +513,7 @@ Feature release\.
## v2\.20\.0
-
+
### Release Summary
Feature and bugfix release\.
@@ -450,12 +521,12 @@ Feature and bugfix release\.
The deprecations in this release are only relevant for collections that use shared
code or docs fragments from this collection\.
-
+
### Minor Changes
* acme\_certificate \- add include\_renewal\_cert\_id option to allow requesting renewal of a specific certificate according to the current ACME Renewal Information specification draft \([https\://github\.com/ansible\-collections/community\.crypto/pull/739](https\://github\.com/ansible\-collections/community\.crypto/pull/739)\)\.
-
+
### Deprecated Features
* acme documentation fragment \- the default community\.crypto\.acme\[\.documentation\] docs fragment is deprecated and will be removed from community\.crypto 3\.0\.0\. Replace it with both the new community\.crypto\.acme\.basic and community\.crypto\.acme\.account fragments \([https\://github\.com/ansible\-collections/community\.crypto/pull/735](https\://github\.com/ansible\-collections/community\.crypto/pull/735)\)\.
@@ -477,7 +548,7 @@ code or docs fragments from this collection\.
## v2\.19\.1
-
+
### Release Summary
Bugfix release\.
@@ -492,18 +563,18 @@ Bugfix release\.
## v2\.19\.0
-
+
### Release Summary
Bugfix and feature release\.
-
+
### Minor Changes
* When using cryptography \>\= 42\.0\.0\, use offset\-aware datetime\.datetime objects \(with timezone UTC\) instead of offset\-naive UTC timestamps \([https\://github\.com/ansible\-collections/community\.crypto/issues/726](https\://github\.com/ansible\-collections/community\.crypto/issues/726)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/727](https\://github\.com/ansible\-collections/community\.crypto/pull/727)\)\.
* openssh\_cert \- avoid UTC functions deprecated in Python 3\.12 when using Python 3 \([https\://github\.com/ansible\-collections/community\.crypto/pull/727](https\://github\.com/ansible\-collections/community\.crypto/pull/727)\)\.
-
+
### Deprecated Features
* acme\.backends module utils \- from community\.crypto on\, all implementations of CryptoBackend must override get\_ordered\_csr\_identifiers\(\)\. The current default implementation\, which simply sorts the result of get\_csr\_identifiers\(\)\, will then be removed \([https\://github\.com/ansible\-collections/community\.crypto/pull/725](https\://github\.com/ansible\-collections/community\.crypto/pull/725)\)\.
@@ -521,17 +592,17 @@ Bugfix and feature release\.
## v2\.18\.0
-
+
### Release Summary
Bugfix and feature release\.
-
+
### Minor Changes
* x509\_crl \- the new option serial\_numbers allow to configure in which format serial numbers can be provided to revoked\_certificates\[\]\.serial\_number\. The default is as integers \(serial\_numbers\=integer\) for backwards compatibility\; setting serial\_numbers\=hex\-octets allows to specify colon\-separated hex octet strings like 00\:11\:22\:FF \([https\://github\.com/ansible\-collections/community\.crypto/issues/687](https\://github\.com/ansible\-collections/community\.crypto/issues/687)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/715](https\://github\.com/ansible\-collections/community\.crypto/pull/715)\)\.
-
+
### Deprecated Features
* openssl\_csr\_pipe\, openssl\_privatekey\_pipe\, x509\_certificate\_pipe \- the current behavior of check mode is deprecated and will change in community\.crypto 3\.0\.0\. The current behavior is similar to the modules without \_pipe\: if the object needs to be \(re\-\)generated\, only the changed status is set\, but the object is not updated\. From community\.crypto 3\.0\.0 on\, the modules will ignore check mode and always act as if check mode is not active\. This behavior can already achieved now by adding check\_mode\: false to the task\. If you think this breaks your use\-case of this module\, please [create an issue in the community\.crypto repository](https\://github\.com/ansible\-collections/community\.crypto/issues/new/choose) \([https\://github\.com/ansible\-collections/community\.crypto/issues/712](https\://github\.com/ansible\-collections/community\.crypto/issues/712)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/714](https\://github\.com/ansible\-collections/community\.crypto/pull/714)\)\.
@@ -555,7 +626,7 @@ Bugfix and feature release\.
## v2\.17\.1
-
+
### Release Summary
Bugfix release for compatibility with cryptography 42\.0\.0\.
@@ -570,12 +641,12 @@ Bugfix release for compatibility with cryptography 42\.0\.0\.
## v2\.17\.0
-
+
### Release Summary
Feature release\.
-
+
### Minor Changes
* luks\_device \- add allow discards option \([https\://github\.com/ansible\-collections/community\.crypto/pull/693](https\://github\.com/ansible\-collections/community\.crypto/pull/693)\)\.
@@ -583,7 +654,7 @@ Feature release\.
## v2\.16\.2
-
+
### Release Summary
Bugfix release\.
@@ -599,7 +670,7 @@ Bugfix release\.
## v2\.16\.1
-
+
### Release Summary
Bugfix release\.
@@ -612,12 +683,12 @@ Bugfix release\.
## v2\.16\.0
-
+
### Release Summary
Bugfix release\.
-
+
### Minor Changes
* luks\_devices \- add new options keyslot\, new\_keyslot\, and remove\_keyslot to allow adding/removing keys to/from specific keyslots \([https\://github\.com/ansible\-collections/community\.crypto/pull/664](https\://github\.com/ansible\-collections/community\.crypto/pull/664)\)\.
@@ -630,7 +701,7 @@ Bugfix release\.
## v2\.15\.1
-
+
### Release Summary
Bugfix release\.
@@ -643,17 +714,17 @@ Bugfix release\.
## v2\.15\.0
-
+
### Release Summary
Bugfix and feature release\.
-
+
### Minor Changes
* openssh\_keypair \- fail when comment cannot be updated \([https\://github\.com/ansible\-collections/community\.crypto/pull/646](https\://github\.com/ansible\-collections/community\.crypto/pull/646)\)\.
-
+
### Deprecated Features
* get\_certificate \- the default false of the asn1\_base64 option is deprecated and will change to true in community\.crypto 3\.0\.0 \([https\://github\.com/ansible\-collections/community\.crypto/pull/600](https\://github\.com/ansible\-collections/community\.crypto/pull/600)\)\.
@@ -680,7 +751,7 @@ Bugfix and feature release\.
## v2\.14\.1
-
+
### Release Summary
Bugfix and maintenance release with updated documentation\.
@@ -706,12 +777,12 @@ for the rendered HTML version of the documentation of the latest release\.
## v2\.14\.0
-
+
### Release Summary
Feature release\.
-
+
### Minor Changes
* acme\_certificate \- allow to use no challenge by providing no challenge for the challenge option\. This is needed for ACME servers where validation is done without challenges \([https\://github\.com/ansible\-collections/community\.crypto/issues/613](https\://github\.com/ansible\-collections/community\.crypto/issues/613)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/615](https\://github\.com/ansible\-collections/community\.crypto/pull/615)\)\.
@@ -721,7 +792,7 @@ Feature release\.
## v2\.13\.1
-
+
### Release Summary
Bugfix release\.
@@ -735,17 +806,17 @@ Bugfix release\.
## v2\.13\.0
-
+
### Release Summary
Bugfix and maintenance release\.
-
+
### Minor Changes
* x509\_crl \- the crl\_mode option has been added to replace the existing mode option \([https\://github\.com/ansible\-collections/community\.crypto/issues/596](https\://github\.com/ansible\-collections/community\.crypto/issues/596)\)\.
-
+
### Deprecated Features
* x509\_crl \- the mode option is deprecated\; use crl\_mode instead\. The mode option will change its meaning in community\.crypto 3\.0\.0\, and will refer to the CRL file\'s mode instead \([https\://github\.com/ansible\-collections/community\.crypto/issues/596](https\://github\.com/ansible\-collections/community\.crypto/issues/596)\)\.
@@ -759,12 +830,12 @@ Bugfix and maintenance release\.
## v2\.12\.0
-
+
### Release Summary
Feature release\.
-
+
### Minor Changes
* get\_certificate \- add asn1\_base64 option to control whether the ASN\.1 included in the extensions return value is binary data or Base64 encoded \([https\://github\.com/ansible\-collections/community\.crypto/pull/592](https\://github\.com/ansible\-collections/community\.crypto/pull/592)\)\.
@@ -772,7 +843,7 @@ Feature release\.
## v2\.11\.1
-
+
### Release Summary
Maintenance release with improved documentation\.
@@ -780,12 +851,12 @@ Maintenance release with improved documentation\.
## v2\.11\.0
-
+
### Release Summary
Feature and bugfix release\.
-
+
### Minor Changes
* get\_certificate \- adds ciphers option for custom cipher selection \([https\://github\.com/ansible\-collections/community\.crypto/pull/571](https\://github\.com/ansible\-collections/community\.crypto/pull/571)\)\.
@@ -800,7 +871,7 @@ Feature and bugfix release\.
## v2\.10\.0
-
+
### Release Summary
Bugfix and feature release\.
@@ -827,12 +898,12 @@ Bugfix and feature release\.
## v2\.9\.0
-
+
### Release Summary
Regular feature release\.
-
+
### Minor Changes
* x509\_certificate\_info \- adds issuer\_uri field in return value based on Authority Information Access data \([https\://github\.com/ansible\-collections/community\.crypto/pull/530](https\://github\.com/ansible\-collections/community\.crypto/pull/530)\)\.
@@ -840,7 +911,7 @@ Regular feature release\.
## v2\.8\.1
-
+
### Release Summary
Maintenance release with improved documentation\.
@@ -848,12 +919,12 @@ Maintenance release with improved documentation\.
## v2\.8\.0
-
+
### Release Summary
Feature release\.
-
+
### Minor Changes
* acme\_\* modules \- handle more gracefully if CA\'s new nonce call does not return a nonce \([https\://github\.com/ansible\-collections/community\.crypto/pull/525](https\://github\.com/ansible\-collections/community\.crypto/pull/525)\)\.
@@ -863,7 +934,7 @@ Feature release\.
## v2\.7\.1
-
+
### Release Summary
Maintenance release\.
@@ -876,12 +947,12 @@ Maintenance release\.
## v2\.7\.0
-
+
### Release Summary
Feature release\.
-
+
### Minor Changes
* acme\* modules \- also support the HTTP 503 Service Unavailable and 408 Request Timeout response status for automatic retries \([https\://github\.com/ansible\-collections/community\.crypto/pull/513](https\://github\.com/ansible\-collections/community\.crypto/pull/513)\)\.
@@ -894,12 +965,12 @@ Feature release\.
## v2\.6\.0
-
+
### Release Summary
Feature release\.
-
+
### Minor Changes
* acme\* modules \- support the HTTP 429 Too Many Requests response status \([https\://github\.com/ansible\-collections/community\.crypto/pull/508](https\://github\.com/ansible\-collections/community\.crypto/pull/508)\)\.
@@ -908,12 +979,12 @@ Feature release\.
## v2\.5\.0
-
+
### Release Summary
Maintenance release with improved licensing declaration and documentation fixes\.
-
+
### Minor Changes
* All software licenses are now in the LICENSES/ directory of the collection root\. Moreover\, SPDX\-License\-Identifier\: is used to declare the applicable license for every file that is not automatically generated \([https\://github\.com/ansible\-collections/community\.crypto/pull/491](https\://github\.com/ansible\-collections/community\.crypto/pull/491)\)\.
@@ -921,12 +992,12 @@ Maintenance release with improved licensing declaration and documentation fixes\
## v2\.4\.0
-
+
### Release Summary
Deprecation and bugfix release\. No new features this time\.
-
+
### Deprecated Features
* Support for Ansible 2\.9 and ansible\-base 2\.10 is deprecated\, and will be removed in the next major release \(community\.crypto 3\.0\.0\)\. Some modules might still work with these versions afterwards\, but we will no longer keep compatibility code that was needed to support them \([https\://github\.com/ansible\-collections/community\.crypto/pull/460](https\://github\.com/ansible\-collections/community\.crypto/pull/460)\)\.
@@ -939,7 +1010,7 @@ Deprecation and bugfix release\. No new features this time\.
## v2\.3\.4
-
+
### Release Summary
Re\-release of what was intended to be 2\.3\.3\.
@@ -955,7 +1026,7 @@ has been added\.
## v2\.3\.3
-
+
### Release Summary
Bugfix release\.
@@ -970,7 +1041,7 @@ Bugfix release\.
## v2\.3\.2
-
+
### Release Summary
Maintenance and bugfix release\.
@@ -984,7 +1055,7 @@ Maintenance and bugfix release\.
## v2\.3\.1
-
+
### Release Summary
Maintenance release\.
@@ -997,12 +1068,12 @@ Maintenance release\.
## v2\.3\.0
-
+
### Release Summary
Feature and bugfix release\.
-
+
### Minor Changes
* Prepare collection for inclusion in an Execution Environment by declaring its dependencies\. Please note that system packages are used for cryptography and PyOpenSSL\, which can be rather limited\. If you need features from newer cryptography versions\, you will have to manually force a newer version to be installed by pip by specifying something like cryptography \>\= 37\.0\.0 in your Execution Environment\'s Python dependencies file \([https\://github\.com/ansible\-collections/community\.crypto/pull/440](https\://github\.com/ansible\-collections/community\.crypto/pull/440)\)\.
@@ -1025,7 +1096,7 @@ Feature and bugfix release\.
## v2\.2\.4
-
+
### Release Summary
Regular maintenance release\.
@@ -1038,7 +1109,7 @@ Regular maintenance release\.
## v2\.2\.3
-
+
### Release Summary
Regular bugfix release\.
@@ -1051,7 +1122,7 @@ Regular bugfix release\.
## v2\.2\.2
-
+
### Release Summary
Regular bugfix release\.
@@ -1070,7 +1141,7 @@ In this release\, we extended the test matrix to include Alpine 3\, ArchLinux\,
## v2\.2\.1
-
+
### Release Summary
Bugfix release\.
@@ -1083,12 +1154,12 @@ Bugfix release\.
## v2\.2\.0
-
+
### Release Summary
Regular bugfix and feature release\.
-
+
### Minor Changes
* openssh\_cert \- added ignore\_timestamps parameter so it can be used semi\-idempotent with relative timestamps in valid\_to/valid\_from \([https\://github\.com/ansible\-collections/community\.crypto/issues/379](https\://github\.com/ansible\-collections/community\.crypto/issues/379)\)\.
@@ -1101,12 +1172,12 @@ Regular bugfix and feature release\.
## v2\.1\.0
-
+
### Release Summary
Feature and bugfix release\.
-
+
### Minor Changes
* Adjust error messages that indicate cryptography is not installed from Can\'t to Cannot \([https\://github\.com/ansible\-collections/community\.crypto/pull/374](https\://github\.com/ansible\-collections/community\.crypto/pull/374)\)\.
@@ -1127,7 +1198,7 @@ Feature and bugfix release\.
## v2\.0\.2
-
+
### Release Summary
Documentation fix release\. No actual code changes\.
@@ -1135,12 +1206,12 @@ Documentation fix release\. No actual code changes\.
## v2\.0\.1
-
+
### Release Summary
Bugfix release with extra forward compatibility for newer versions of cryptography\.
-
+
### Minor Changes
* acme\_\* modules \- fix usage of fetch\_url with changes in latest ansible\-core devel branch \([https\://github\.com/ansible\-collections/community\.crypto/pull/339](https\://github\.com/ansible\-collections/community\.crypto/pull/339)\)\.
@@ -1156,12 +1227,12 @@ Bugfix release with extra forward compatibility for newer versions of cryptograp
## v2\.0\.0
-
+
### Release Summary
A new major release of the community\.crypto collection\. The main changes are removal of the PyOpenSSL backends for almost all modules \(openssl\_pkcs12 being the only exception\)\, and removal of the assertonly provider in the x509\_certificate provider\. There are also some other breaking changes which should improve the user interface/experience of this collection long\-term\.
-
+
### Minor Changes
* acme\_certificate \- the subject and issuer fields in in the select\_chain entries are now more strictly validated \([https\://github\.com/ansible\-collections/community\.crypto/pull/316](https\://github\.com/ansible\-collections/community\.crypto/pull/316)\)\.
@@ -1172,7 +1243,7 @@ A new major release of the community\.crypto collection\. The main
* x509\_crl \- provide a new issuer\_ordered option if the order of the components in the issuer is of importance \([https\://github\.com/ansible\-collections/community\.crypto/issues/291](https\://github\.com/ansible\-collections/community\.crypto/issues/291)\, [https\://github\.com/ansible\-collections/community\.crypto/pull/316](https\://github\.com/ansible\-collections/community\.crypto/pull/316)\)\.
* x509\_crl \- there is now stricter validation of the values of the issuer option \([https\://github\.com/ansible\-collections/community\.crypto/pull/316](https\://github\.com/ansible\-collections/community\.crypto/pull/316)\)\.
-
+
### Breaking Changes / Porting Guide
* Adjust dirName text parsing and to text converting code to conform to [Sections 2 and 3 of RFC 4514](https\://datatracker\.ietf\.org/doc/html/rfc4514\.html)\. This is similar to how [cryptography handles this](https\://cryptography\.io/en/latest/x509/reference/\#cryptography\.x509\.Name\.rfc4514\_string) \([https\://github\.com/ansible\-collections/community\.crypto/pull/274](https\://github\.com/ansible\-collections/community\.crypto/pull/274)\)\.
@@ -1186,12 +1257,12 @@ A new major release of the community\.crypto collection\. The main
* openssl\_privatekey\_info \- by default consistency checks are not run\; they need to be explicitly requested by passing check\_consistency\=true \([https\://github\.com/ansible\-collections/community\.crypto/pull/309](https\://github\.com/ansible\-collections/community\.crypto/pull/309)\)\.
* x509\_crl \- for idempotency checks\, the issuer order is ignored\. If order is important\, use the new issuer\_ordered option \([https\://github\.com/ansible\-collections/community\.crypto/pull/316](https\://github\.com/ansible\-collections/community\.crypto/pull/316)\)\.
-
+
### Deprecated Features
* acme\_\* modules \- ACME version 1 is now deprecated and support for it will be removed in community\.crypto 2\.0\.0 \([https\://github\.com/ansible\-collections/community\.crypto/pull/288](https\://github\.com/ansible\-collections/community\.crypto/pull/288)\)\.
-
+
### Removed Features \(previously deprecated\)
* acme\_\* modules \- the acme\_directory option is now required \([https\://github\.com/ansible\-collections/community\.crypto/pull/290](https\://github\.com/ansible\-collections/community\.crypto/pull/290)\)\.
@@ -1230,7 +1301,7 @@ A new major release of the community\.crypto collection\. The main
## v1\.9\.4
-
+
### Release Summary
Regular bugfix release\.
@@ -1244,7 +1315,7 @@ Regular bugfix release\.
## v1\.9\.3
-
+
### Release Summary
Regular bugfix release\.
@@ -1257,7 +1328,7 @@ Regular bugfix release\.
## v1\.9\.2
-
+
### Release Summary
Bugfix release to fix the changelog\. No other change compared to 1\.9\.0\.
@@ -1265,7 +1336,7 @@ Bugfix release to fix the changelog\. No other change compared to 1\.9\.0\.
## v1\.9\.1
-
+
### Release Summary
Accidental 1\.9\.1 release\. Identical to 1\.9\.0\.
@@ -1273,12 +1344,12 @@ Accidental 1\.9\.1 release\. Identical to 1\.9\.0\.
## v1\.9\.0
-
+
### Release Summary
Regular feature release\.
-
+
### Minor Changes
* get\_certificate \- added starttls option to retrieve certificates from servers which require clients to request an encrypted connection \([https\://github\.com/ansible\-collections/community\.crypto/pull/264](https\://github\.com/ansible\-collections/community\.crypto/pull/264)\)\.
@@ -1295,12 +1366,12 @@ Regular feature release\.
## v1\.8\.0
-
+
### Release Summary
Regular bugfix and feature release\.
-
+
### Minor Changes
* Avoid internal ansible\-core module\_utils in favor of equivalent public API available since at least Ansible 2\.9 \([https\://github\.com/ansible\-collections/community\.crypto/pull/253](https\://github\.com/ansible\-collections/community\.crypto/pull/253)\)\.
@@ -1317,7 +1388,7 @@ Regular bugfix and feature release\.
## v1\.7\.1
-
+
### Release Summary
Bugfix release\.
@@ -1330,12 +1401,12 @@ Bugfix release\.
## v1\.7\.0
-
+
### Release Summary
Regular feature and bugfix release\.
-
+
### Minor Changes
* cryptography\_openssh module utils \- new module\_utils for managing asymmetric keypairs and OpenSSH formatted/encoded asymmetric keypairs \([https\://github\.com/ansible\-collections/community\.crypto/pull/213](https\://github\.com/ansible\-collections/community\.crypto/pull/213)\)\.
@@ -1373,7 +1444,7 @@ Regular feature and bugfix release\.
## v1\.6\.2
-
+
### Release Summary
Bugfix release\. Fixes compatibility issue of ACME modules with step\-ca\.
@@ -1386,7 +1457,7 @@ Bugfix release\. Fixes compatibility issue of ACME modules with step\-ca\.
## v1\.6\.1
-
+
### Release Summary
Bugfix release\.
@@ -1399,12 +1470,12 @@ Bugfix release\.
## v1\.6\.0
-
+
### Release Summary
Fixes compatibility issues with the latest ansible\-core 2\.11 beta\, and contains a lot of internal refactoring for the ACME modules and support for private key passphrases for them\.
-
+
### Minor Changes
* acme module\_utils \- the acme module\_utils has been split up into several Python modules \([https\://github\.com/ansible\-collections/community\.crypto/pull/184](https\://github\.com/ansible\-collections/community\.crypto/pull/184)\)\.
@@ -1413,7 +1484,7 @@ Fixes compatibility issues with the latest ansible\-core 2\.11 beta\, and contai
* acme\_certificate\_revoke \- support revoking by private keys that are passphrase protected for cryptography backend \([https\://github\.com/ansible\-collections/community\.crypto/pull/207](https\://github\.com/ansible\-collections/community\.crypto/pull/207)\)\.
* acme\_challenge\_cert\_helper \- add private\_key\_passphrase parameter \([https\://github\.com/ansible\-collections/community\.crypto/pull/207](https\://github\.com/ansible\-collections/community\.crypto/pull/207)\)\.
-
+
### Deprecated Features
* acme module\_utils \- the acme module\_utils \(ansible\_collections\.community\.crypto\.plugins\.module\_utils\.acme\) is deprecated and will be removed in community\.crypto 2\.0\.0\. Use the new Python modules in the acme package instead \(ansible\_collections\.community\.crypto\.plugins\.module\_utils\.acme\.xxx\) \([https\://github\.com/ansible\-collections/community\.crypto/pull/184](https\://github\.com/ansible\-collections/community\.crypto/pull/184)\)\.
@@ -1427,18 +1498,18 @@ Fixes compatibility issues with the latest ansible\-core 2\.11 beta\, and contai
## v1\.5\.0
-
+
### Release Summary
Regular feature and bugfix release\. Deprecates a return value\.
-
+
### Minor Changes
* acme\_account\_info \- when retrieve\_orders is not ignore and the ACME server allows to query orders\, the new return value order\_uris is always populated with a list of URIs \([https\://github\.com/ansible\-collections/community\.crypto/pull/178](https\://github\.com/ansible\-collections/community\.crypto/pull/178)\)\.
* luks\_device \- allow to specify sector size for LUKS2 containers with new sector\_size parameter \([https\://github\.com/ansible\-collections/community\.crypto/pull/193](https\://github\.com/ansible\-collections/community\.crypto/pull/193)\)\.
-
+
### Deprecated Features
* acme\_account\_info \- when retrieve\_orders\=url\_list\, orders will no longer be returned in community\.crypto 2\.0\.0\. Use order\_uris instead \([https\://github\.com/ansible\-collections/community\.crypto/pull/178](https\://github\.com/ansible\-collections/community\.crypto/pull/178)\)\.
@@ -1451,12 +1522,12 @@ Regular feature and bugfix release\. Deprecates a return value\.
## v1\.4\.0
-
+
### Release Summary
Release with several new features and bugfixes\.
-
+
### Minor Changes
* The ACME module\_utils has been relicensed back from the Simplified BSD License \([https\://opensource\.org/licenses/BSD\-2\-Clause](https\://opensource\.org/licenses/BSD\-2\-Clause)\) to the GPLv3\+ \(same license used by most other code in this collection\)\. This undoes a licensing change when the original GPLv3\+ licensed code was moved to module\_utils in [https\://github\.com/ansible/ansible/pull/40697](https\://github\.com/ansible/ansible/pull/40697) \([https\://github\.com/ansible\-collections/community\.crypto/pull/165](https\://github\.com/ansible\-collections/community\.crypto/pull/165)\)\.
@@ -1474,12 +1545,12 @@ Release with several new features and bugfixes\.
## v1\.3\.0
-
+
### Release Summary
Contains new modules openssl\_privatekey\_pipe\, openssl\_csr\_pipe and x509\_certificate\_pipe which allow to create or update private keys\, CSRs and X\.509 certificates without having to write them to disk\.
-
+
### Minor Changes
* openssh\_cert \- add module parameter use\_agent to enable using signing keys stored in ssh\-agent \([https\://github\.com/ansible\-collections/community\.crypto/issues/116](https\://github\.com/ansible\-collections/community\.crypto/issues/116)\)\.
@@ -1506,12 +1577,12 @@ Contains new modules openssl\_privatekey\_pipe\, openssl\_csr
## v1\.2\.0
-
+
### Release Summary
Please note that this release fixes a security issue \(CVE\-2020\-25646\)\.
-
+
### Minor Changes
* acme\_certificate \- allow to pass CSR file as content with new option csr\_content \([https\://github\.com/ansible\-collections/community\.crypto/pull/115](https\://github\.com/ansible\-collections/community\.crypto/pull/115)\)\.
@@ -1535,7 +1606,7 @@ Please note that this release fixes a security issue \(CVE\-2020\-25646\)\.
## v1\.1\.1
-
+
### Release Summary
Bugfixes for Ansible 2\.10\.0\.
@@ -1549,12 +1620,12 @@ Bugfixes for Ansible 2\.10\.0\.
## v1\.1\.0
-
+
### Release Summary
Release for Ansible 2\.10\.0\.
-
+
### Minor Changes
* acme\_account \- add external\_account\_binding option to allow creation of ACME accounts with External Account Binding \([https\://github\.com/ansible\-collections/community\.crypto/issues/89](https\://github\.com/ansible\-collections/community\.crypto/issues/89)\)\.
@@ -1583,12 +1654,12 @@ Release for Ansible 2\.10\.0\.
## v1\.0\.0
-
+
### Release Summary
This is the first proper release of the community\.crypto collection\. This changelog contains all changes to the modules in this collection that were added after the release of Ansible 2\.9\.0\.
-
+
### Minor Changes
* luks\_device \- accept passphrase\, new\_passphrase and remove\_passphrase\.
@@ -1617,12 +1688,12 @@ This is the first proper release of the community\.crypto collectio
* openssl\_publickey \- allow to provide private key content via private\_key\_content option\.
* openssl\_publickey \- allow to return the existing/generated public key directly as publickey by setting return\_content to yes\.
-
+
### Deprecated Features
* openssl\_csr \- all values for the version option except 1 are deprecated\. The value 1 denotes the current only standardized CSR version\.
-
+
### Removed Features \(previously deprecated\)
* The letsencrypt module has been removed\. Use acme\_certificate instead\.
diff --git a/CHANGELOG.rst b/CHANGELOG.rst
index c017350e..f741792d 100644
--- a/CHANGELOG.rst
+++ b/CHANGELOG.rst
@@ -4,6 +4,71 @@ Community Crypto Release Notes
.. contents:: Topics
+v3.0.0-a1
+=========
+
+Release Summary
+---------------
+
+First pre-release for community.crypto 3.0.0.
+This release drops compatibility for ansible-core before 2.17, for Python before 3.7, and for cryptography before 3.3.
+
+Minor Changes
+-------------
+
+- No longer provide cryptography's ``backend`` parameter. This will break with cryptography < 3.1 (https://github.com/ansible-collections/community.crypto/pull/878).
+- On cryptography 36.0.0+, always use ``public_bytes()`` for X.509 extension objects instead of using cryptography internals to obtain DER value of extension (https://github.com/ansible-collections/community.crypto/pull/878).
+- Python code modernization: add type hints and type checking (https://github.com/ansible-collections/community.crypto/pull/885).
+- Python code modernization: avoid unnecessary string conversion (https://github.com/ansible-collections/community.crypto/pull/880).
+- Python code modernization: avoid using ``six`` (https://github.com/ansible-collections/community.crypto/pull/884).
+- Python code modernization: remove Python 3 specific code (https://github.com/ansible-collections/community.crypto/pull/877).
+- Python code modernization: update ``__future__`` imports, remove Python 2 specific boilerplates (https://github.com/ansible-collections/community.crypto/pull/876).
+- Python code modernization: use ``unittest.mock`` instead of ``ansible_collections.community.internal_test_tools.tests.unit.compat.mock`` (https://github.com/ansible-collections/community.crypto/pull/881).
+- Python code modernization: use f-strings instead of ``%`` and ``str.format()`` (https://github.com/ansible-collections/community.crypto/pull/875).
+- Remove ``backend`` parameter from internal code whenever possible (https://github.com/ansible-collections/community.crypto/pull/883).
+- Remove various compatibility code for cryptography < 3.3 (https://github.com/ansible-collections/community.crypto/pull/878).
+- Remove vendored copy of ``distutils.version`` in favor of vendored copy included with ansible-core 2.12+ (https://github.com/ansible-collections/community.crypto/pull/371).
+- acme_* modules - improve parsing of ``Retry-After`` reply headers in regular ACME requests (https://github.com/ansible-collections/community.crypto/pull/890).
+- action_module plugin utils - remove compatibility with older ansible-core/ansible-base/Ansible versions (https://github.com/ansible-collections/community.crypto/pull/872).
+- x509_certificate, x509_certificate_pipe - the ``ownca_version`` and ``selfsigned_version`` parameters explicitly only allow the value ``3``. The module already failed for other values in the past, now this is validated as part of the module argument spec (https://github.com/ansible-collections/community.crypto/pull/890).
+
+Breaking Changes / Porting Guide
+--------------------------------
+
+- All doc_fragments are now private to the collection and must not be used from other collections or unrelated plugins/modules. Breaking changes in these can happen at any time, even in bugfix releases (https://github.com/ansible-collections/community.crypto/pull/898).
+- All module_utils and plugin_utils are now private to the collection and must not be used from other collections or unrelated plugins/modules. Breaking changes in these can happen at any time, even in bugfix releases (https://github.com/ansible-collections/community.crypto/pull/887).
+- Ignore value of ``select_crypto_backend`` for all modules except acme_* and ..., and always assume the value ``auto``. This ensures that the ``cryptography`` version is always checked (https://github.com/ansible-collections/community.crypto/pull/883).
+- The validation for relative timestamps is now more strict. A string starting with ``+`` or ``-`` must be valid, otherwise validation will fail. In the past such strings were often silently ignored, and in many cases the code which triggered the validation was not able to handle no result (https://github.com/ansible-collections/community.crypto/pull/885).
+- acme.certificates module utils - the ``retrieve_acme_v1_certificate()`` helper function has been removed (https://github.com/ansible-collections/community.crypto/pull/873).
+- get_certificate - the default for ``asn1_base64`` changed from ``false`` to ``true`` (https://github.com/ansible-collections/community.crypto/pull/873).
+- x509_crl - the ``mode`` parameter no longer denotes the update mode, but the CRL file mode. Use ``crl_mode`` instead for the update mode (https://github.com/ansible-collections/community.crypto/pull/873).
+
+Deprecated Features
+-------------------
+
+- acme_certificate - deprecate the ``agreement`` option which has no more effect. It will be removed from community.crypto 4.0.0 (https://github.com/ansible-collections/community.crypto/pull/891).
+- openssl_pkcs12 - deprecate the ``maciter_size`` option which has no more effect. It will be removed from community.crypto 4.0.0 (https://github.com/ansible-collections/community.crypto/pull/891).
+
+Removed Features (previously deprecated)
+----------------------------------------
+
+- The collection no longer supports cryptography < 3.3 (https://github.com/ansible-collections/community.crypto/pull/878, https://github.com/ansible-collections/community.crypto/pull/882).
+- acme.acme module utils - the ``get_default_argspec()`` function has been removed. Use ``create_default_argspec()`` instead (https://github.com/ansible-collections/community.crypto/pull/873).
+- acme.backends module utils - the methods ``get_ordered_csr_identifiers()`` and ``get_cert_information()`` of ``CryptoBackend`` now must be implemented (https://github.com/ansible-collections/community.crypto/pull/873).
+- acme.documentation docs fragment - the ``documentation`` docs fragment has been removed. Use both the ``basic`` and ``account`` docs fragments in ``acme`` instead (https://github.com/ansible-collections/community.crypto/pull/873).
+- acme_* modules - support for ACME v1 has been removed (https://github.com/ansible-collections/community.crypto/pull/873).
+- community.crypto no longer supports Ansible 2.9, ansible-base 2.10, and ansible-core versions 2.11, 2.12, 2.13, 2.14, 2.15, and 2.16. While content from this collection might still work with some older versions of ansible-core, it will not work with any Python version before 3.7 (https://github.com/ansible-collections/community.crypto/pull/870).
+- crypto.basic module utils - remove ``CRYPTOGRAPHY_HAS_*`` flags. All tested features are supported since cryptography 3.0 (https://github.com/ansible-collections/community.crypto/pull/878).
+- crypto.cryptography_support module utils - remove ``cryptography_serial_number_of_cert()`` helper function (https://github.com/ansible-collections/community.crypto/pull/878).
+- crypto.module_backends.common module utils - this module utils has been removed. Use the ``argspec`` module utils instead (https://github.com/ansible-collections/community.crypto/pull/873).
+- crypto.support module utils - remove ``pyopenssl`` backend (https://github.com/ansible-collections/community.crypto/pull/874).
+- execution environment dependencies - remove PyOpenSSL dependency (https://github.com/ansible-collections/community.crypto/pull/874).
+- openssl_csr_pipe - the module now ignores check mode and will always behave as if check mode is not active (https://github.com/ansible-collections/community.crypto/pull/873).
+- openssl_pkcs12 - support for the ``pyopenssl`` backend has been removed (https://github.com/ansible-collections/community.crypto/pull/873).
+- openssl_privatekey_pipe - the module now ignores check mode and will always behave as if check mode is not active (https://github.com/ansible-collections/community.crypto/pull/873).
+- time module utils - remove ``pyopenssl`` backend (https://github.com/ansible-collections/community.crypto/pull/874).
+- x509_certificate_pipe - the module now ignores check mode and will always behave as if check mode is not active (https://github.com/ansible-collections/community.crypto/pull/873).
+
v2.26.1
=======
diff --git a/changelogs/changelog.yaml b/changelogs/changelog.yaml
index 7d878593..189740d0 100644
--- a/changelogs/changelog.yaml
+++ b/changelogs/changelog.yaml
@@ -1643,3 +1643,113 @@ releases:
- 867-passphrase-encoding-nolog.yml
- 868-luks-remove-keyslot.yml
release_date: '2025-04-28'
+ 3.0.0-a1:
+ changes:
+ breaking_changes:
+ - All doc_fragments are now private to the collection and must not be used
+ from other collections or unrelated plugins/modules. Breaking changes in
+ these can happen at any time, even in bugfix releases (https://github.com/ansible-collections/community.crypto/pull/898).
+ - All module_utils and plugin_utils are now private to the collection and
+ must not be used from other collections or unrelated plugins/modules. Breaking
+ changes in these can happen at any time, even in bugfix releases (https://github.com/ansible-collections/community.crypto/pull/887).
+ - Ignore value of ``select_crypto_backend`` for all modules except acme_*
+ and ..., and always assume the value ``auto``. This ensures that the ``cryptography``
+ version is always checked (https://github.com/ansible-collections/community.crypto/pull/883).
+ - The validation for relative timestamps is now more strict. A string starting
+ with ``+`` or ``-`` must be valid, otherwise validation will fail. In the
+ past such strings were often silently ignored, and in many cases the code
+ which triggered the validation was not able to handle no result (https://github.com/ansible-collections/community.crypto/pull/885).
+ - acme.certificates module utils - the ``retrieve_acme_v1_certificate()``
+ helper function has been removed (https://github.com/ansible-collections/community.crypto/pull/873).
+ - get_certificate - the default for ``asn1_base64`` changed from ``false``
+ to ``true`` (https://github.com/ansible-collections/community.crypto/pull/873).
+ - x509_crl - the ``mode`` parameter no longer denotes the update mode, but
+ the CRL file mode. Use ``crl_mode`` instead for the update mode (https://github.com/ansible-collections/community.crypto/pull/873).
+ deprecated_features:
+ - acme_certificate - deprecate the ``agreement`` option which has no more
+ effect. It will be removed from community.crypto 4.0.0 (https://github.com/ansible-collections/community.crypto/pull/891).
+ - openssl_pkcs12 - deprecate the ``maciter_size`` option which has no more
+ effect. It will be removed from community.crypto 4.0.0 (https://github.com/ansible-collections/community.crypto/pull/891).
+ minor_changes:
+ - No longer provide cryptography's ``backend`` parameter. This will break
+ with cryptography < 3.1 (https://github.com/ansible-collections/community.crypto/pull/878).
+ - On cryptography 36.0.0+, always use ``public_bytes()`` for X.509 extension
+ objects instead of using cryptography internals to obtain DER value of extension
+ (https://github.com/ansible-collections/community.crypto/pull/878).
+ - 'Python code modernization: add type hints and type checking (https://github.com/ansible-collections/community.crypto/pull/885).'
+ - 'Python code modernization: avoid unnecessary string conversion (https://github.com/ansible-collections/community.crypto/pull/880).'
+ - 'Python code modernization: avoid using ``six`` (https://github.com/ansible-collections/community.crypto/pull/884).'
+ - 'Python code modernization: remove Python 3 specific code (https://github.com/ansible-collections/community.crypto/pull/877).'
+ - 'Python code modernization: update ``__future__`` imports, remove Python
+ 2 specific boilerplates (https://github.com/ansible-collections/community.crypto/pull/876).'
+ - 'Python code modernization: use ``unittest.mock`` instead of ``ansible_collections.community.internal_test_tools.tests.unit.compat.mock``
+ (https://github.com/ansible-collections/community.crypto/pull/881).'
+ - 'Python code modernization: use f-strings instead of ``%`` and ``str.format()``
+ (https://github.com/ansible-collections/community.crypto/pull/875).'
+ - Remove ``backend`` parameter from internal code whenever possible (https://github.com/ansible-collections/community.crypto/pull/883).
+ - Remove various compatibility code for cryptography < 3.3 (https://github.com/ansible-collections/community.crypto/pull/878).
+ - Remove vendored copy of ``distutils.version`` in favor of vendored copy
+ included with ansible-core 2.12+ (https://github.com/ansible-collections/community.crypto/pull/371).
+ - acme_* modules - improve parsing of ``Retry-After`` reply headers in regular
+ ACME requests (https://github.com/ansible-collections/community.crypto/pull/890).
+ - action_module plugin utils - remove compatibility with older ansible-core/ansible-base/Ansible
+ versions (https://github.com/ansible-collections/community.crypto/pull/872).
+ - x509_certificate, x509_certificate_pipe - the ``ownca_version`` and ``selfsigned_version``
+ parameters explicitly only allow the value ``3``. The module already failed
+ for other values in the past, now this is validated as part of the module
+ argument spec (https://github.com/ansible-collections/community.crypto/pull/890).
+ release_summary: 'First pre-release for community.crypto 3.0.0.
+
+ This release drops compatibility for ansible-core before 2.17, for Python
+ before 3.7, and for cryptography before 3.3.
+
+ '
+ removed_features:
+ - The collection no longer supports cryptography < 3.3 (https://github.com/ansible-collections/community.crypto/pull/878,
+ https://github.com/ansible-collections/community.crypto/pull/882).
+ - acme.acme module utils - the ``get_default_argspec()`` function has been
+ removed. Use ``create_default_argspec()`` instead (https://github.com/ansible-collections/community.crypto/pull/873).
+ - acme.backends module utils - the methods ``get_ordered_csr_identifiers()``
+ and ``get_cert_information()`` of ``CryptoBackend`` now must be implemented
+ (https://github.com/ansible-collections/community.crypto/pull/873).
+ - acme.documentation docs fragment - the ``documentation`` docs fragment has
+ been removed. Use both the ``basic`` and ``account`` docs fragments in ``acme``
+ instead (https://github.com/ansible-collections/community.crypto/pull/873).
+ - acme_* modules - support for ACME v1 has been removed (https://github.com/ansible-collections/community.crypto/pull/873).
+ - community.crypto no longer supports Ansible 2.9, ansible-base 2.10, and
+ ansible-core versions 2.11, 2.12, 2.13, 2.14, 2.15, and 2.16. While content
+ from this collection might still work with some older versions of ansible-core,
+ it will not work with any Python version before 3.7 (https://github.com/ansible-collections/community.crypto/pull/870).
+ - crypto.basic module utils - remove ``CRYPTOGRAPHY_HAS_*`` flags. All tested
+ features are supported since cryptography 3.0 (https://github.com/ansible-collections/community.crypto/pull/878).
+ - crypto.cryptography_support module utils - remove ``cryptography_serial_number_of_cert()``
+ helper function (https://github.com/ansible-collections/community.crypto/pull/878).
+ - crypto.module_backends.common module utils - this module utils has been
+ removed. Use the ``argspec`` module utils instead (https://github.com/ansible-collections/community.crypto/pull/873).
+ - crypto.support module utils - remove ``pyopenssl`` backend (https://github.com/ansible-collections/community.crypto/pull/874).
+ - execution environment dependencies - remove PyOpenSSL dependency (https://github.com/ansible-collections/community.crypto/pull/874).
+ - openssl_csr_pipe - the module now ignores check mode and will always behave
+ as if check mode is not active (https://github.com/ansible-collections/community.crypto/pull/873).
+ - openssl_pkcs12 - support for the ``pyopenssl`` backend has been removed
+ (https://github.com/ansible-collections/community.crypto/pull/873).
+ - openssl_privatekey_pipe - the module now ignores check mode and will always
+ behave as if check mode is not active (https://github.com/ansible-collections/community.crypto/pull/873).
+ - time module utils - remove ``pyopenssl`` backend (https://github.com/ansible-collections/community.crypto/pull/874).
+ - x509_certificate_pipe - the module now ignores check mode and will always
+ behave as if check mode is not active (https://github.com/ansible-collections/community.crypto/pull/873).
+ fragments:
+ - 3.0.0-a1.yml
+ - 371-distutils-vendor-removed.yml
+ - 870-ansible-core.yml
+ - 872-action-module.yml
+ - 873-deprecation-removals.yml
+ - 874-pyopenssl.yml
+ - 878-backend.yml
+ - 883-backend.yml
+ - 887-module_utils-plugin_utils.yml
+ - 890-refactoring.yml
+ - 891-deprecation.yml
+ - 898-doc_fragments.yml
+ - refactoring.yml
+ - relative-timestamps.yml
+ release_date: '2025-05-18'
diff --git a/changelogs/fragments/3.0.0-a1.yml b/changelogs/fragments/3.0.0-a1.yml
deleted file mode 100644
index 8810500c..00000000
--- a/changelogs/fragments/3.0.0-a1.yml
+++ /dev/null
@@ -1,3 +0,0 @@
-release_summary: |
- First pre-release for community.crypto 3.0.0.
- This release drops compatibility for ansible-core before 2.17, for Python before 3.7, and for cryptography before 3.3.
diff --git a/changelogs/fragments/371-distutils-vendor-removed.yml b/changelogs/fragments/371-distutils-vendor-removed.yml
deleted file mode 100644
index 032b232b..00000000
--- a/changelogs/fragments/371-distutils-vendor-removed.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-minor_changes:
- - "Remove vendored copy of ``distutils.version`` in favor of vendored copy included with ansible-core 2.12+ (https://github.com/ansible-collections/community.crypto/pull/371)."
diff --git a/changelogs/fragments/870-ansible-core.yml b/changelogs/fragments/870-ansible-core.yml
deleted file mode 100644
index 3b4eb3e0..00000000
--- a/changelogs/fragments/870-ansible-core.yml
+++ /dev/null
@@ -1,5 +0,0 @@
-removed_features:
- - "community.crypto no longer supports Ansible 2.9, ansible-base 2.10, and ansible-core versions 2.11, 2.12, 2.13, 2.14, 2.15, and 2.16.
- While content from this collection might still work with some older versions of ansible-core, it will not work with any Python version
- before 3.7
- (https://github.com/ansible-collections/community.crypto/pull/870)."
diff --git a/changelogs/fragments/872-action-module.yml b/changelogs/fragments/872-action-module.yml
deleted file mode 100644
index bab82e4b..00000000
--- a/changelogs/fragments/872-action-module.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-minor_changes:
- - "action_module plugin utils - remove compatibility with older ansible-core/ansible-base/Ansible versions (https://github.com/ansible-collections/community.crypto/pull/872)."
diff --git a/changelogs/fragments/873-deprecation-removals.yml b/changelogs/fragments/873-deprecation-removals.yml
deleted file mode 100644
index 7b83dd75..00000000
--- a/changelogs/fragments/873-deprecation-removals.yml
+++ /dev/null
@@ -1,14 +0,0 @@
-removed_features:
- - "openssl_csr_pipe - the module now ignores check mode and will always behave as if check mode is not active (https://github.com/ansible-collections/community.crypto/pull/873)."
- - "openssl_privatekey_pipe - the module now ignores check mode and will always behave as if check mode is not active (https://github.com/ansible-collections/community.crypto/pull/873)."
- - "x509_certificate_pipe - the module now ignores check mode and will always behave as if check mode is not active (https://github.com/ansible-collections/community.crypto/pull/873)."
- - "openssl_pkcs12 - support for the ``pyopenssl`` backend has been removed (https://github.com/ansible-collections/community.crypto/pull/873)."
- - "crypto.module_backends.common module utils - this module utils has been removed. Use the ``argspec`` module utils instead (https://github.com/ansible-collections/community.crypto/pull/873)."
- - "acme.acme module utils - the ``get_default_argspec()`` function has been removed. Use ``create_default_argspec()`` instead (https://github.com/ansible-collections/community.crypto/pull/873)."
- - "acme.backends module utils - the methods ``get_ordered_csr_identifiers()`` and ``get_cert_information()`` of ``CryptoBackend`` now must be implemented (https://github.com/ansible-collections/community.crypto/pull/873)."
- - "acme_* modules - support for ACME v1 has been removed (https://github.com/ansible-collections/community.crypto/pull/873)."
- - "acme.documentation docs fragment - the ``documentation`` docs fragment has been removed. Use both the ``basic`` and ``account`` docs fragments in ``acme`` instead (https://github.com/ansible-collections/community.crypto/pull/873)."
-breaking_changes:
- - "get_certificate - the default for ``asn1_base64`` changed from ``false`` to ``true`` (https://github.com/ansible-collections/community.crypto/pull/873)."
- - "acme.certificates module utils - the ``retrieve_acme_v1_certificate()`` helper function has been removed (https://github.com/ansible-collections/community.crypto/pull/873)."
- - "x509_crl - the ``mode`` parameter no longer denotes the update mode, but the CRL file mode. Use ``crl_mode`` instead for the update mode (https://github.com/ansible-collections/community.crypto/pull/873)."
diff --git a/changelogs/fragments/874-pyopenssl.yml b/changelogs/fragments/874-pyopenssl.yml
deleted file mode 100644
index 28978456..00000000
--- a/changelogs/fragments/874-pyopenssl.yml
+++ /dev/null
@@ -1,4 +0,0 @@
-removed_features:
- - "crypto.support module utils - remove ``pyopenssl`` backend (https://github.com/ansible-collections/community.crypto/pull/874)."
- - "time module utils - remove ``pyopenssl`` backend (https://github.com/ansible-collections/community.crypto/pull/874)."
- - "execution environment dependencies - remove PyOpenSSL dependency (https://github.com/ansible-collections/community.crypto/pull/874)."
diff --git a/changelogs/fragments/878-backend.yml b/changelogs/fragments/878-backend.yml
deleted file mode 100644
index 3f93efb8..00000000
--- a/changelogs/fragments/878-backend.yml
+++ /dev/null
@@ -1,8 +0,0 @@
-minor_changes:
- - "No longer provide cryptography's ``backend`` parameter. This will break with cryptography < 3.1 (https://github.com/ansible-collections/community.crypto/pull/878)."
- - "Remove various compatibility code for cryptography < 3.3 (https://github.com/ansible-collections/community.crypto/pull/878)."
- - "On cryptography 36.0.0+, always use ``public_bytes()`` for X.509 extension objects instead of using cryptography internals to obtain DER value of extension (https://github.com/ansible-collections/community.crypto/pull/878)."
-removed_features:
- - "crypto.basic module utils - remove ``CRYPTOGRAPHY_HAS_*`` flags. All tested features are supported since cryptography 3.0 (https://github.com/ansible-collections/community.crypto/pull/878)."
- - "crypto.cryptography_support module utils - remove ``cryptography_serial_number_of_cert()`` helper function (https://github.com/ansible-collections/community.crypto/pull/878)."
- - "The collection no longer supports cryptography < 3.3 (https://github.com/ansible-collections/community.crypto/pull/878, https://github.com/ansible-collections/community.crypto/pull/882)."
diff --git a/changelogs/fragments/883-backend.yml b/changelogs/fragments/883-backend.yml
deleted file mode 100644
index 3e65b06e..00000000
--- a/changelogs/fragments/883-backend.yml
+++ /dev/null
@@ -1,5 +0,0 @@
-minor_changes:
- - "Remove ``backend`` parameter from internal code whenever possible (https://github.com/ansible-collections/community.crypto/pull/883)."
-breaking_changes:
- - "Ignore value of ``select_crypto_backend`` for all modules except acme_* and ..., and always assume the value ``auto``.
- This ensures that the ``cryptography`` version is always checked (https://github.com/ansible-collections/community.crypto/pull/883)."
diff --git a/changelogs/fragments/887-module_utils-plugin_utils.yml b/changelogs/fragments/887-module_utils-plugin_utils.yml
deleted file mode 100644
index 58378bb2..00000000
--- a/changelogs/fragments/887-module_utils-plugin_utils.yml
+++ /dev/null
@@ -1,4 +0,0 @@
-breaking_changes:
- - "All module_utils and plugin_utils are now private to the collection and must not be used from other collections or unrelated plugins/modules.
- Breaking changes in these can happen at any time, even in bugfix releases
- (https://github.com/ansible-collections/community.crypto/pull/887)."
diff --git a/changelogs/fragments/890-refactoring.yml b/changelogs/fragments/890-refactoring.yml
deleted file mode 100644
index d9b879f2..00000000
--- a/changelogs/fragments/890-refactoring.yml
+++ /dev/null
@@ -1,5 +0,0 @@
-minor_changes:
- - "x509_certificate, x509_certificate_pipe - the ``ownca_version`` and ``selfsigned_version`` parameters explicitly only allow the value ``3``.
- The module already failed for other values in the past, now this is validated as part of the module argument spec
- (https://github.com/ansible-collections/community.crypto/pull/890)."
- - "acme_* modules - improve parsing of ``Retry-After`` reply headers in regular ACME requests (https://github.com/ansible-collections/community.crypto/pull/890)."
diff --git a/changelogs/fragments/891-deprecation.yml b/changelogs/fragments/891-deprecation.yml
deleted file mode 100644
index e4a8d08e..00000000
--- a/changelogs/fragments/891-deprecation.yml
+++ /dev/null
@@ -1,3 +0,0 @@
-deprecated_features:
- - "acme_certificate - deprecate the ``agreement`` option which has no more effect. It will be removed from community.crypto 4.0.0 (https://github.com/ansible-collections/community.crypto/pull/891)."
- - "openssl_pkcs12 - deprecate the ``maciter_size`` option which has no more effect. It will be removed from community.crypto 4.0.0 (https://github.com/ansible-collections/community.crypto/pull/891)."
diff --git a/changelogs/fragments/898-doc_fragments.yml b/changelogs/fragments/898-doc_fragments.yml
deleted file mode 100644
index 1189d0f5..00000000
--- a/changelogs/fragments/898-doc_fragments.yml
+++ /dev/null
@@ -1,4 +0,0 @@
-breaking_changes:
- - "All doc_fragments are now private to the collection and must not be used from other collections or unrelated plugins/modules.
- Breaking changes in these can happen at any time, even in bugfix releases
- (https://github.com/ansible-collections/community.crypto/pull/898)."
diff --git a/changelogs/fragments/refactoring.yml b/changelogs/fragments/refactoring.yml
deleted file mode 100644
index ef11dc2c..00000000
--- a/changelogs/fragments/refactoring.yml
+++ /dev/null
@@ -1,8 +0,0 @@
-minor_changes:
- - "Python code modernization: use f-strings instead of ``%`` and ``str.format()`` (https://github.com/ansible-collections/community.crypto/pull/875)."
- - "Python code modernization: update ``__future__`` imports, remove Python 2 specific boilerplates (https://github.com/ansible-collections/community.crypto/pull/876)."
- - "Python code modernization: use ``unittest.mock`` instead of ``ansible_collections.community.internal_test_tools.tests.unit.compat.mock`` (https://github.com/ansible-collections/community.crypto/pull/881)."
- - "Python code modernization: remove Python 3 specific code (https://github.com/ansible-collections/community.crypto/pull/877)."
- - "Python code modernization: avoid unnecessary string conversion (https://github.com/ansible-collections/community.crypto/pull/880)."
- - "Python code modernization: avoid using ``six`` (https://github.com/ansible-collections/community.crypto/pull/884)."
- - "Python code modernization: add type hints and type checking (https://github.com/ansible-collections/community.crypto/pull/885)."
diff --git a/changelogs/fragments/relative-timestamps.yml b/changelogs/fragments/relative-timestamps.yml
deleted file mode 100644
index b5e6a716..00000000
--- a/changelogs/fragments/relative-timestamps.yml
+++ /dev/null
@@ -1,5 +0,0 @@
-breaking_changes:
- - "The validation for relative timestamps is now more strict. A string starting with ``+`` or ``-`` must be valid,
- otherwise validation will fail. In the past such strings were often silently ignored, and in many cases the code
- which triggered the validation was not able to handle no result
- (https://github.com/ansible-collections/community.crypto/pull/885)."