salt/doc/topics/releases/2016.11.0.rst
rallytime 0eab0ee8a6 Merge branch '2016.11' into 'develop'
Conflicts:
  - doc/topics/releases/2016.11.0.rst
2016-12-01 12:14:33 -07:00

771 lines
29 KiB
ReStructuredText

==============================================
Salt 2016.11.0 Release Notes - Codename Carbon
==============================================
New Features
============
Docker Introspection and Configuration
--------------------------------------
Major additions have been made to the Docker support in 2016.11.0. The new
addition allows Salt to be executed within a Docker container without a
minion running or installed in the container. This allows states to
be run inside a container, but also all of Salt's remote execution
commands to be run inside docker containers as well. This makes
container introspection simple and powerful. See the tutorial on using
this new feature here:
See :ref:`Salt in Docker Containers <docker-sls>`.
Advanced Ceph Control
---------------------
Our friends over at SUSE have delivered a powerful new tool to make the
deployment of Ceph storage systems using Salt very easy. These new Ceph
tools allow for a storage system to be easily defined using the new
`ceph.quorum` state.
Thorium Additions and Improvements
----------------------------------
The Thorium advanced reactor has undergone extensive testing and updates.
These updates include many more Thorium states, a system for automating
key management, the ability to use Thorium to easily replace old
reactors and a great deal of stability and bug fixes.
State Rollback Using Snapper
----------------------------
Rollback has been one of the most prevalent requests for Salt. We
have researched it extensively and concluded that the only way to
accomplish truly reliable rollback would be to execute it at
the filesystem layer. To accomplish this we have introduced Snapper
integration into Salt States.
Snapper is a tool which allows for simple and reliable snapshots
of the filesystem to be made. With the new `snapper_states` option
set to `True` in the minion config a snapshot will be made before
and after every Salt State run.
These snapshots can be viewed, managed and rolled back to via the
`snapper` execution module.
Preserve File Perms in File States
----------------------------------
This feature has been requested for years, the ability to set a flag
and use the same file permissions for files deployed to a minion as
the permissions set to the file on the master. Just set the `keep_mode`
option on any file management state to `True`.
Ponies!
-------
We all agreed that cowsay was just not good enough, install the `ponysay`
command and the new `pony` outputter will work. Fun for the whole family!
Additional Features
-------------------
- Minions can run in stand-alone mode to use beacons and engines without
having to connect to a master. (Thanks @adelcast!)
- Added a ``salt`` runner to allow running salt modules via salt-run.
.. code-block:: bash
salt-run salt.cmd test.ping
# call functions with arguments and keyword arguments
salt-run salt.cmd test.arg 1 2 3 a=1
- Added SSL support to Cassandra CQL returner.
SSL can be enabled by setting ``ssl_options`` for the returner.
Also added support for specifying ``protocol_version`` when establishing
cluster connection.
- The ``mode`` parameter in the :py:mod:`file.managed
<salt.states.file.managed>` state, and the ``file_mode`` parameter in the
:py:mod:`file.recurse <salt.states.file.recurse>` state, can both now be set
to ``keep`` and the minion will keep the mode of the file from the Salt
fileserver. This works only with files coming from sources prefixed with
``salt://``, or files local to the minion (i.e. those which are absolute
paths, or are prefixed with ``file://``). For example:
.. code-block:: yaml
/etc/myapp/myapp.conf:
file.managed:
- source: salt://conf/myapp/myapp.conf
- mode: keep
/var/www/myapp:
file.recurse:
- source: salt://path/to/myapp
- dir_mode: 755
- file_mode: keep
- The ``junos`` state module is now available. It has all the functions
that are present in the ``junos`` execution module.
- The minion data cache is a pluggable data store now. It's configurable with
:conf_master:`cache` option. Default is ``localfs``.
- User names in :conf_master:`client_acl` support glob matching now.
New Top File Merging Strategy for States
========================================
A new strategy called ``merge_all`` has been added to provide a new way of
merging top file matches when executing a :ref:`highstate <running-highstate>`.
See the :conf_master:`top_file_merging_strategy` documentation for further
information.
In addition, the ``same`` merging strategy was not functioning as documented.
This has now been corrected. While this is technically a bugfix, we decided to
hold a change in top file merging until a feature release to minimize user
impact.
Improved Archive Extraction Support
===================================
The :py:func:`archive.extracted <salt.states.archive.extracted>` state has been
overhauled. Notable changes include the following:
- When enforcing ownership (with the ``user`` and/or ``group`` arguments), the
``if_missing`` argument no longer has any connection to which path(s) have
ownership enforced. Instead, the paths are determined using the either the
newly-added :py:func:`archive.list <salt.modules.archive.list_>` function, or
the newly-added ``enforce_ownership_on`` argument.
- ``if_missing`` also is no longer required to skip extraction, as Salt is now
able to tell which paths would be present if the archive were extracted. It
should, in most cases, only be necessary in cases where a semaphore file is
used to conditionally skip extraction of the archive.
- Password-protected ZIP archives are now detected before extraction, and the
state fails without attempting to extract the archive if no password was
specified.
- By default, a single top-level directory is enforced, to guard against
'tar-bombs'. This enforcement can be disabled by setting ``enforce_toplevel``
to ``False``.
- The ``tar_options`` and ``zip_options`` arguments have been deprecated in
favor of a single ``options`` argument.
- The ``archive_format`` argument is now optional. The ending of the ``source``
argument is used to guess whether it is a tar, zip or rar file. If the
``archive_format`` cannot be guessed, then it will need to be specified, but
in many cases it can now be omitted.
- Ownership enforcement is now performed irrespective of whether or not the
archive needed to be extracted. This means that the state can be re-run after
the archive has been fully extracted to repair changes to ownership.
A number of new arguments were also added. See the docs py:func:`docs for the
archive.extracted state <salt.states.archive.extracted>` for more information.
Additionally, the following changes have been made to the :mod:`archive
<salt.modules.archive>` execution module:
- A new function (:py:func:`archive.list <salt.modules.archive.list_>`) has
been added. This function lists the files/directories in an archive file, and
supports a ``verbose`` argument that gives a more detailed breakdown of which
paths are files, which are directories, and which paths are at the top level
of the archive.
- A new function (:py:func:`archive.is_encrypted
<salt.modules.archive.is_encrypted>`) has been added. This function will
return ``True`` if the archive is a password-protected ZIP file, ``False`` if
not. If the archive is not a ZIP file, an error will be raised.
- :py:func:`archive.cmd_unzip <salt.modules.archive.cmd_unzip>` now supports
passing a password, bringing it to feature parity with
:py:func:`archive.unzip <salt.modules.archive.unzip>`. Note that this is
still not considered to be secure, and :py:func:`archive.unzip
<salt.modules.archive.unzip>` is recommended for dealing with
password-protected ZIP archives.
- The default value for the ``extract_perms`` argument to
:py:func:`archive.unzip <salt.modules.archive.unzip>` has been changed to
``True``.
Improved Checksum Handling in :py:func:`file.managed <salt.states.file.managed>`, :py:func:`archive.extracted <salt.states.archive.extracted>` States
-----------------------------------------------------------------------------------------------------------------------------------------------------
When the ``source_hash`` argument for these states refers to a file containing
checksums, Salt now looks for checksums matching the name of the source URI, as
well as the file being managed. Prior releases only looked for checksums
matching the filename being managed. Additionally, a new argument
(``source_hash_name``) has been added, which allows the user to disambiguate
ambiguous matches when more than one matching checksum is found in the
``source_hash`` file.
A more detailed explanation of this functionality can be found in the
:py:func:`file.managed <salt.states.file.managed>` documentation, in the
section for the new ``source_hash_name`` argument.
.. note::
This improved functionality is also available in the ``2016.3`` (Boron)
release cycle, starting with the 2016.3.5 release.
Config Changes
==============
The following default config values were changed:
- ``gitfs_ssl_verify``: Changed from ``False`` to ``True``
- ``git_pillar_ssl_verify``: Changed from ``False`` to ``True``
- ``winrepo_ssl_verify``: Changed from ``False`` to ``True``
Grains Changes
==============
- All core grains containing ``VMWare`` have been changed to ``VMware``, which
is the `official capitalization <https://www.vmware.com>`_. Additionally,
all references to ``VMWare`` in the documentation have been changed to
``VMware`` :issue:`30807`. Environments using versions of Salt before and
after Salt 2016.11.0 should employ case-insensitive grain matching on these
grains.
.. code-block:: jinja
{% set on_vmware = grains['virtual'].lower() == 'vmware' %}
- On Windows the ``cpu_model`` grain has been changed to provide the actual cpu
model name and not the cpu family.
Old behavior:
.. code-block:: bash
root@master:~# salt 'testwin200' grains.item cpu_model
testwin200:
----------
cpu_model:
Intel64 Family 6 Model 58 Stepping 9, GenuineIntel
New behavior:
.. code-block:: bash
root@master:~# salt 'testwin200' grains.item cpu_model
testwin200:
----------
cpu_model:
Intel(R) Core(TM) i7-3520M CPU @ 2.90GHz
Beacons Changes
===============
- The ``loadavg`` beacon now outputs averages as integers instead of strings.
(Via :issue:`31124`.)
Runner Changes
==============
- Runners can now call out to :ref:`utility modules <writing-utility-modules>`
via ``__utils__``.
- ref:`Utility modules <writing-utility-modules>` (placed in
``salt://_utils/``) are now able to be synced to the master, making it easier
to use them in custom runners. A :py:mod:`saltutil.sync_utils
<salt.runners.saltutil.sync_utils>` function has been added to the
:py:mod:`saltutil runner <salt.runners.saltutil>` to faciliate the syncing of
utility modules to the master.
Pillar Changes
==============
- Thanks to the new :py:mod:`saltutil.sync_utils
<salt.runners.saltutil.sync_utils>` runner, it is now easier to get
ref:`utility modules <writing-utility-modules>` synced to the correct
location on the Master so that they are available in execution modules called
from Pillar SLS files.
Network Automation: NAPALM
==========================
Beginning with 2016.11.0, network automation is inclued by default in the core
of Salt. It is based on a the `NAPALM <https://github.com/napalm-automation/napalm>`_
library and provides facilities to manage the configuration and retrieve data
from network devices running widely used operating systems such: JunOS, IOS-XR,
eOS, IOS, NX-OS etc.
- see `the complete list of supported devices <http://napalm.readthedocs.io/en/latest/support/index.html#supported-devices>`_.
The connection is established via the :mod:`NAPALM proxy <salt.proxy.napalm>`.
In the current release, the following modules were included:
- :mod:`NAPALM grains <salt.grains.napalm>` - Select network devices based on their characteristics
- :mod:`NET execution module <salt.modules.napalm_network>` - Networking basic features
- :mod:`NTP execution module <salt.modules.napalm_ntp>`
- :mod:`BGP execution module <salt.modules.napalm_bgp>`
- :mod:`Routes execution module <salt.modules.napalm_route>`
- :mod:`SNMP execution module <salt.modules.napalm_snmp>`
- :mod:`Users execution module <salt.modules.napalm_users>`
- :mod:`Probes execution module <salt.modules.napalm_probes>`
- :mod:`NTP peers management state <salt.states.netntp>`
- :mod:`SNMP configuration management state <salt.states.netsnmp>`
- :mod:`Users management state <salt.states.netusers>`
Junos Module Changes
====================
- The following new functionalities were added to the junos module
- facts - Displays the facts gathered during the connection.
- shutdown - Shut down or reboot a device running Junos OS.
- install_config - Modify the configuration of a Junos device.
- install_os - Install Junos OS software package.
- zeroize - Remove all configuration information on the Routing Engines and reset all key values on a device.
- file_copy - Copy file from proxy to the Junos device.
Returner Changes
================
- Any returner which implements a `save_load` function is now required to
accept a `minions` keyword argument. All returners which ship with Salt
have been modified to do so.
Renderer Changes
================
Added the ability to restrict allowed renderers. Two new config parameters,
:conf_master:`renderer_whitelist` and :conf_master:`renderer_blacklist` are
introduced for this purpose.
eAuth Changes
=============
- External auth modules' ``auth`` method can return an ACL list for the given
username instead of ``True``. This list should be in the same format as
described in the :doc:`eAuth documentation </topics/eauth/index>`. It will be
used for the user instead of one set in master config.
Example of the ``auth`` method return that allows a user to execute functions
in the ``test`` and ``network`` modules on the minions that match the ``web*``
target and allow access to ``wheel`` and ``runner`` modules:
.. code-block:: python
[{'web*': ['test.*',
'network.*']},
'@wheel',
'@runner']
- External auth is supported by :doc:`salt-run </ref/cli/salt-run>` and
:doc:`salt-key </ref/cli/salt-key>` now. Note that master must be started to
use them with eAuth.
External Module Packaging
=========================
Modules may now be packaged via entry-points in setuptools. See
:doc:`external module packaging </topics/tutorials/packaging_modules>` tutorial
for more information.
Functionality Changes
=====================
- The ``onfail`` requisite now uses OR logic instead of AND logic.
:issue:`22370`
- The consul external pillar now strips leading and trailing whitespace.
:issue:`31165`
- The win_system.py state is now case sensitive for computer names. Previously
computer names set with a state were converted to all caps. If you have a
state setting computer names with lower case letters in the name that has
been applied, the computer name will be changed again to apply the case
sensitive name.
- The ``mac_user.list_groups`` function in the ``mac_user`` execution module
now lists all groups for the specified user, including groups beginning with
an underscore. In previous releases, groups beginning with an underscore were
excluded from the list of groups.
- The ``junos.call_rpc`` function in the ``junos`` execution module can now be used
to call any valid rpc. Earlier it used to call only "get_software_information".
- A new option for minions called ``master_tries`` has been added. This
specifies the number of times a minion should attempt to contact a master to
attempt a connection. This allows better handling of occasional master
downtime in a multi-master topology.
- Nodegroups consisting of a simple list of minion IDs can now also be declared
as a yaml list. The below two examples are equivalent:
.. code-block:: yaml
# Traditional way
nodegroups:
- group1: L@host1,host2,host3
# New way (optional)
nodegroups:
- group1:
- host1
- host2
- host3
New Modules
===========
Beacons
-------
- :mod:`salt.beacons.bonjour_announce <salt.beacons.bonjour_announce>`
- :mod:`salt.beacons.haproxy <salt.beacons.haproxy>`
- :mod:`salt.beacons.status <salt.beacons.status>`
Engines
-------
- :mod:`salt.engines.hipchat <salt.engines.hipchat>`
- :mod:`salt.engines.http_logstash <salt.engines.http_logstash>`
Modules
-------
- :mod:`salt.modules.boto_cloudwatch_event <salt.modules.boto_cloudwatch_event>`
- :mod:`salt.modules.celery <salt.modules.celery>`
- :mod:`salt.modules.ceph <salt.modules.ceph>`
- :mod:`salt.modules.influx08 <salt.modules.influx08>`
- :mod:`salt.modules.inspectlib.entities <salt.modules.inspectlib.entities>`
- :mod:`salt.modules.inspectlib.fsdb <salt.modules.inspectlib.fsdb>`
- :mod:`salt.modules.inspectlib.kiwiproc <salt.modules.inspectlib.kiwiproc>`
- :mod:`salt.modules.inspector <salt.modules.inspector>`
- :mod:`salt.modules.libcloud_dns <salt.modules.libcloud_dns>`
- :mod:`salt.modules.openstack_mng <salt.modules.openstack_mng>`
- :mod:`salt.modules.servicenow <salt.modules.servicenow>`
- :mod:`salt.modules.testinframod <salt.modules.testinframod>`
- :mod:`salt.modules.win_lgpo <salt.modules.win_lgpo>`
- :mod:`salt.modules.win_pki <salt.modules.win_pki>`
- :mod:`salt.modules.win_psget <salt.modules.win_psget>`
- :mod:`salt.modules.win_snmp <salt.modules.win_snmp>`
- :mod:`salt.modules.xbpspkg <salt.modules.xbpspkg>`
Outputters
----------
- :mod:`salt.output.pony <salt.output.pony>`
Pillar
------
- :mod:`salt.pillar.csvpillar <salt.pillar.csvpillar>`
- :mod:`salt.pillar.http_json <salt.pillar.http_json>`
- :mod:`salt.pillar.makostack <salt.pillar.makostack>`
Returners
---------
- :mod:`salt.returners.zabbix_return <salt.returners.zabbix_return>`
Runners
-------
- :mod:`salt.runners.auth <salt.runners.auth>`
- :mod:`salt.runners.event <salt.runners.event>`
- :mod:`salt.runners.smartos_vmadm <salt.runners.smartos_vmadm>`
- :mod:`salt.runners.vistara <salt.runners.vistara>`
SDB
---
- :mod:`salt.sdb.env <salt.sdb.env>`
States
------
- :mod:`salt.states.boto_cloudwatch_event <salt.states.boto_cloudwatch_event>`
- :mod:`salt.states.csf <salt.states.csf>`
- :mod:`salt.states.ethtool <salt.states.ethtool>`
- :mod:`salt.states.influxdb08_database <salt.states.influxdb08_database>`
- :mod:`salt.states.influxdb08_user <salt.states.influxdb08_user>`
- :mod:`salt.states.libcloud_dns <salt.states.libcloud_dns>`
- :mod:`salt.states.snapper <salt.states.snapper>`
- :mod:`salt.states.testinframod <salt.states.testinframod>`
- :mod:`salt.states.win_lgpo <salt.states.win_lgpo>`
- :mod:`salt.states.win_pki <salt.states.win_pki>`
- :mod:`salt.states.win_snmp <salt.states.win_snmp>`
Thorium
-------
- :mod:`salt.thorium.calc <salt.thorium.calc>`
- :mod:`salt.thorium.key <salt.thorium.key>`
- :mod:`salt.thorium.runner <salt.thorium.runner>`
- :mod:`salt.thorium.status <salt.thorium.status>`
- :mod:`salt.thorium.wheel <salt.thorium.wheel>`
Deprecations
============
General Deprecations
--------------------
- ``env`` to ``saltenv``
All occurrences of ``env`` and some occurrences of ``__env__`` marked for
deprecation in Salt 2016.11.0 have been removed. The new way to use the salt
environment setting is with a variable called ``saltenv``:
.. code-block:: python
def fcn(msg='', env='base', refresh=True, saltenv='base', **kwargs):
has been changed to
.. code-block:: python
def fcn(msg='', refresh=True, saltenv='base', **kwargs):
- If ``env`` (or ``__env__``) is supplied as a keyword argument to a function
that also accepts arbitrary keyword arguments, then a new warning informs the
user that ``env`` is no longer used if it is found. This new warning will be
removed in Salt Nitrogen.
.. code-block:: python
def fcn(msg='', refresh=True, saltenv='base', **kwargs):
.. code-block:: python
# will result in a warning log message
fcn(msg='add more salt', env='prod', refresh=False)
- If ``env`` (or ``__env__``) is supplied as a keyword argument to a function
that does not accept arbitrary keyword arguments, then python will issue an
error.
.. code-block:: python
def fcn(msg='', refresh=True, saltenv='base'):
.. code-block:: python
# will result in a python TypeError
fcn(msg='add more salt', env='prod', refresh=False)
- If ``env`` (or ``__env__``) is supplied as a positional argument to a
function, then undefined behavior will occur, as the removal of ``env`` and
``__env__`` from the function's argument list changes the function's
signature.
.. code-block:: python
def fcn(msg='', refresh=True, saltenv='base'):
.. code-block:: python
# will result in refresh evaluating to True and saltenv likely not being a string at all
fcn('add more salt', 'prod', False)
- Deprecations in ``minion.py``:
- The ``salt.minion.parse_args_and_kwargs`` function has been removed. Please
use the ``salt.minion.load_args_and_kwargs`` function instead.
Cloud Deprecations
------------------
- The ``vsphere`` cloud driver has been removed. Please use the ``vmware`` cloud driver
instead.
- The ``private_ip`` option in the ``linode`` cloud driver is deprecated and has been
removed. Use the ``assign_private_ip`` option instead.
- The ``create_dns_record`` and ``delete_dns_record`` functions are deprecated and have
been removed from the ``digital_ocean`` driver. Use the ``post_dns_record`` function
instead.
Execution Module Deprecations
-----------------------------
- The ``blockdev`` execution module had four functions removed:
- dump
- tune
- resize2fs
- wipe
The ``disk`` module should be used instead with the same function names.
- The ``boto_vpc`` execution module had two functions removed,
``boto_vpc.associate_new_dhcp_options_to_vpc`` and
``boto_vpc.associate_new_network_acl_to_subnet`` in favor of more concise function
names, ``boto_vpc.create_dhcp_options`` and ``boto_vpc.create_network_acl``, respectively.
- The ``data`` execution module had ``getval`` and ``getvals`` functions removed
in favor of one function, ``get``, which combines the functionality of the
removed functions.
- File module deprecations:
- The ``contains_regex_multiline`` function was removed. Use ``file.search`` instead.
- Additional command line options for ``file.grep`` should be passed one at a time.
Please do not pass more than one in a single argument.
- The ``lxc`` execution module has the following changes:
- The ``run_cmd`` function was removed. Use ``lxc.run`` instead.
- The ``nic`` argument was removed from the ``lxc.init`` function. Use ``network_profile``
instead.
- The ``clone`` argument was removed from the ``lxc.init`` function. Use ``clone_from``
instead.
- passwords passed to the ``lxc.init`` function will be assumed to be hashed, unless
``password_encrypted=False``.
- The ``restart`` argument for ``lxc.start`` was removed. Use ``lxc.restart`` instead.
- The old style of defining lxc containers has been removed. Please use keys under which
LXC profiles should be configured such as ``lxc.container_profile.profile_name``.
- The ``env`` and ``activate`` keyword arguments have been removed from the ``install``
function in the ``pip`` execution module. The use of ``bin_env`` replaces both of these
options.
- ``reg`` execution module
Functions in the ``reg`` execution module had misleading and confusing names
for dealing with the Windows registry. They failed to clearly differentiate
between hives, keys, and name/value pairs. Keys were treated like value names.
There was no way to delete a key.
New functions were added in 2015.5 to properly work with the registry. They
also made it possible to edit key default values as well as delete an entire
key tree recursively. With the new functions in place, the following functions
have been deprecated:
- read_key
- set_key
- create_key
- delete_key
Use the following functions instead:
- for ``read_key`` use ``read_value``
- for ``set_key`` use ``set_value``
- for ``create_key`` use ``set_value`` with no ``vname`` and no ``vdata``
- for ``delete_key`` use ``delete_key_recursive``. To delete a value, use
``delete_value``.
- The ``hash_hostname`` option was removed from the ``salt.modules.ssh`` execution
module. The ``hash_known_hosts`` option should be used instead.
- The ``human_readable`` option was removed from the ``uptime`` function in the
``status`` execution module. The function was also updated in 2015.8.9 to return
a more complete offering of uptime information, formatted as an easy-to-read
dictionary. This updated function replaces the need for the ``human_readable``
option.
- The ``persist`` kwarg was removed from the ``win_useradd`` execution module. This
option is no longer supported for Windows. ``persist`` is only supported as part
of user management in UNIX/Linux.
- The ``zpool_list`` function in the ``zpool`` execution module was removed. Use ``list``
instead.
Outputter Module Deprecations
-----------------------------
- The ``compact`` outputter has been removed. Set ``state_verbose`` to ``False`` instead.
Runner Module Deprecations
--------------------------
- The ``grains.cache`` runner no longer accepts ``outputter`` or ``minion`` as keyword arguments.
Users will need to specify an outputter using the ``--out`` option. ``tgt`` is
replacing the ``minion`` kwarg.
- The ``fileserver`` runner no longer accepts the ``outputter`` keyword argument. Users will
need to specify an outputter using the ``--out`` option.
- The ``jobs`` runner no longer accepts the ``ouputter`` keyword argument. Users will need to
specify an outputter using the ``--out`` option.
- ``virt`` runner module:
- The ``hyper`` kwarg was removed from the ``init``, ``list``, and ``query`` functions.
Use the ``host`` option instead.
- The ``next_hyper`` function was removed. Use the ``next_host`` function instead.
- The ``hyper_info`` function was removed. Use the ``host_info`` function instead.
State Module Deprecations
-------------------------
- The ``env`` and ``activate`` keyword arguments were removed from the ``installed``
function in the ``pip`` state module. The use of ``bin_env`` replaces both of these
options.
- ``reg`` state module
The ``reg`` state module was modified to work with the new functions in the
execution module. Some logic was left in the ``reg.present`` and the
``reg.absent`` functions to handle existing state files that used the final
key in the name as the value name. That logic has been removed so you now must
specify value name (``vname``) and, if needed, value data (``vdata``).
For example, a state file that adds the version value/data pair to the
Software\\Salt key in the HKEY_LOCAL_MACHINE hive used to look like this:
.. code-block:: yaml
HKEY_LOCAL_MACHINE\\Software\\Salt\\version:
reg.present:
- value: 2016.3.1
Now it should look like this:
.. code-block:: yaml
HKEY_LOCAL_MACHINE\\Software\\Salt
reg.present:
- vname: version
- vdata: 2016.3.1
A state file for removing the same value added above would have looked like
this:
.. code-block:: yaml
HKEY_LOCAL_MACHINE\\Software\\Salt\\version:
reg.absent:
Now it should look like this:
.. code-block:: yaml
HKEY_LOCAL_MACHINE\\Software\\Salt
reg.absent:
- vname: version
This new structure is important as it allows salt to deal with key default
values which was not possible before. If vname is not passed, salt will work
with the default value for that hive\key.
Additionally, since you could only delete a value from a the state module, a
new function (``key_absent``) has been added to allow you to delete a registry
key and all subkeys and name/value pairs recursively. It uses the new
``delete_key_recursive`` function.
For additional information see the documentation for the ``reg`` execution and
state modules.
- ``lxc`` state module: The following functions were removed from the ``lxc`` state
module:
- ``created``: replaced by the ``present`` state.
- ``started``: replaced by the ``running`` state.
- ``cloned``: replaced by the ``present`` state. Use the ``clone_from`` argument
to set the name of the clone source.
- The ``hash_hostname`` option was removed from the ``salt.states.ssh_known_hosts``
state. The ``hash_known_hosts`` option should be used instead.
- The ``always`` kwarg used in the ``built`` function of the ``pkgbuild`` state module
was removed. Use ``force`` instead.
Utils Module Deprecations
-------------------------
- The use of ``jid_dir`` and ``jid_load`` were removed from the
``salt.utils.jid``. ``jid_dir`` functionality for job_cache management was moved to
the ``local_cache`` returner. ``jid_load`` data is now retrieved from the
``master_job_cache``.
- ``ip_in_subnet`` function in ``salt.utils.network.py`` has been removed. Use the
``in_subnet`` function instead.
- The ``iam`` utils module had two functions removed: ``salt.utils.iam.get_iam_region``
and ``salt.utils.iam.get_iam_metadata`` in favor of the aws utils functions
``salt.utils.aws.get_region_from_metadata`` and ``salt.utils.aws.creds``, respectively.