modules: fix examples to use FQCN (#644)

* modules: fix examples to use FQCN

* fix

* fix

* fix
This commit is contained in:
Andrew Klychkov 2020-07-13 22:50:31 +03:00 committed by GitHub
commit 41cfdda6a3
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
533 changed files with 2130 additions and 2130 deletions

View file

@ -29,14 +29,14 @@ extends_documentation_fragment:
EXAMPLES = r'''
- name: Ensure the default login shell is bash.
ipa_config:
community.general.ipa_config:
ipadefaultloginshell: /bin/bash
ipa_host: localhost
ipa_user: admin
ipa_pass: supersecret
- name: Ensure the default e-mail domain is ansible.com.
ipa_config:
community.general.ipa_config:
ipadefaultemaildomain: ansible.com
ipa_host: localhost
ipa_user: admin

View file

@ -68,7 +68,7 @@ extends_documentation_fragment:
EXAMPLES = r'''
- name: Ensure dns record is present
ipa_dnsrecord:
community.general.ipa_dnsrecord:
ipa_host: spider.example.com
ipa_pass: Passw0rd!
state: present
@ -78,7 +78,7 @@ EXAMPLES = r'''
record_value: '::1'
- name: Ensure that dns record exists with a TTL
ipa_dnsrecord:
community.general.ipa_dnsrecord:
name: host02
zone_name: example.com
record_type: 'AAAA'
@ -89,7 +89,7 @@ EXAMPLES = r'''
state: present
- name: Ensure a PTR record is present
ipa_dnsrecord:
community.general.ipa_dnsrecord:
ipa_host: spider.example.com
ipa_pass: Passw0rd!
state: present
@ -99,7 +99,7 @@ EXAMPLES = r'''
record_value: 'internal.ipa.example.com'
- name: Ensure a TXT record is present
ipa_dnsrecord:
community.general.ipa_dnsrecord:
ipa_host: spider.example.com
ipa_pass: Passw0rd!
state: present
@ -109,7 +109,7 @@ EXAMPLES = r'''
record_value: 'EXAMPLE.COM'
- name: Ensure an SRV record is present
ipa_dnsrecord:
community.general.ipa_dnsrecord:
ipa_host: spider.example.com
ipa_pass: Passw0rd!
state: present
@ -119,7 +119,7 @@ EXAMPLES = r'''
record_value: '10 50 88 ipa.example.com'
- name: Ensure an MX record is present
ipa_dnsrecord:
community.general.ipa_dnsrecord:
ipa_host: spider.example.com
ipa_pass: Passw0rd!
state: present
@ -129,7 +129,7 @@ EXAMPLES = r'''
record_value: '1 mailserver.example.com'
- name: Ensure that dns record is removed
ipa_dnsrecord:
community.general.ipa_dnsrecord:
name: host01
zone_name: example.com
record_type: 'AAAA'

View file

@ -39,14 +39,14 @@ extends_documentation_fragment:
EXAMPLES = r'''
- name: Ensure dns zone is present
ipa_dnszone:
community.general.ipa_dnszone:
ipa_host: spider.example.com
ipa_pass: Passw0rd!
state: present
zone_name: example.com
- name: Ensure dns zone is present and is dynamic update
ipa_dnszone:
community.general.ipa_dnszone:
ipa_host: spider.example.com
ipa_pass: Passw0rd!
state: present
@ -54,7 +54,7 @@ EXAMPLES = r'''
dynamicupdate: true
- name: Ensure that dns zone is removed
ipa_dnszone:
community.general.ipa_dnszone:
zone_name: example.com
ipa_host: localhost
ipa_user: admin

View file

@ -67,7 +67,7 @@ extends_documentation_fragment:
EXAMPLES = r'''
- name: Ensure group is present
ipa_group:
community.general.ipa_group:
name: oinstall
gidnumber: '54321'
state: present
@ -76,7 +76,7 @@ EXAMPLES = r'''
ipa_pass: topsecret
- name: Ensure that groups sysops and appops are assigned to ops but no other group
ipa_group:
community.general.ipa_group:
name: ops
group:
- sysops
@ -86,7 +86,7 @@ EXAMPLES = r'''
ipa_pass: topsecret
- name: Ensure that users linus and larry are assign to the group, but no other user
ipa_group:
community.general.ipa_group:
name: sysops
user:
- linus
@ -96,7 +96,7 @@ EXAMPLES = r'''
ipa_pass: topsecret
- name: Ensure group is absent
ipa_group:
community.general.ipa_group:
name: sysops
state: absent
ipa_host: ipa.example.com

View file

@ -108,7 +108,7 @@ extends_documentation_fragment:
EXAMPLES = r'''
- name: Ensure rule to allow all users to access any host from any host
ipa_hbacrule:
community.general.ipa_hbacrule:
name: allow_all
description: Allow all users to access any host from any host
hostcategory: all
@ -120,7 +120,7 @@ EXAMPLES = r'''
ipa_pass: topsecret
- name: Ensure rule with certain limitations
ipa_hbacrule:
community.general.ipa_hbacrule:
name: allow_all_developers_access_to_db
description: Allow all developers to access any database from any host
hostgroup:
@ -133,7 +133,7 @@ EXAMPLES = r'''
ipa_pass: topsecret
- name: Ensure rule is absent
ipa_hbacrule:
community.general.ipa_hbacrule:
name: rule_to_be_deleted
state: absent
ipa_host: ipa.example.com

View file

@ -89,7 +89,7 @@ extends_documentation_fragment:
EXAMPLES = r'''
- name: Ensure host is present
ipa_host:
community.general.ipa_host:
name: host01.example.com
description: Example host
ip_address: 192.168.0.123
@ -100,51 +100,51 @@ EXAMPLES = r'''
- "08:00:27:E3:B1:2D"
- "52:54:00:BD:97:1E"
state: present
ipa_host: ipa.example.com
community.general.ipa_host: ipa.example.com
ipa_user: admin
ipa_pass: topsecret
- name: Generate a random password for bulk enrolment
ipa_host:
community.general.ipa_host:
name: host01.example.com
description: Example host
ip_address: 192.168.0.123
state: present
ipa_host: ipa.example.com
community.general.ipa_host: ipa.example.com
ipa_user: admin
ipa_pass: topsecret
validate_certs: False
random_password: True
- name: Ensure host is disabled
ipa_host:
community.general.ipa_host:
name: host01.example.com
state: disabled
ipa_host: ipa.example.com
community.general.ipa_host: ipa.example.com
ipa_user: admin
ipa_pass: topsecret
- name: Ensure that all user certificates are removed
ipa_host:
community.general.ipa_host:
name: host01.example.com
user_certificate: []
ipa_host: ipa.example.com
community.general.ipa_host: ipa.example.com
ipa_user: admin
ipa_pass: topsecret
- name: Ensure host is absent
ipa_host:
community.general.ipa_host:
name: host01.example.com
state: absent
ipa_host: ipa.example.com
community.general.ipa_host: ipa.example.com
ipa_user: admin
ipa_pass: topsecret
- name: Ensure host and its DNS record is absent
ipa_host:
community.general.ipa_host:
name: host01.example.com
state: absent
ipa_host: ipa.example.com
community.general.ipa_host: ipa.example.com
ipa_user: admin
ipa_pass: topsecret
update_dns: True

View file

@ -54,7 +54,7 @@ extends_documentation_fragment:
EXAMPLES = r'''
- name: Ensure host-group databases is present
ipa_hostgroup:
community.general.ipa_hostgroup:
name: databases
state: present
host:
@ -67,7 +67,7 @@ EXAMPLES = r'''
ipa_pass: topsecret
- name: Ensure host-group databases is absent
ipa_hostgroup:
community.general.ipa_hostgroup:
name: databases
state: absent
ipa_host: ipa.example.com

View file

@ -84,7 +84,7 @@ extends_documentation_fragment:
EXAMPLES = r'''
- name: Ensure role is present
ipa_role:
community.general.ipa_role:
name: dba
description: Database Administrators
state: present
@ -96,7 +96,7 @@ EXAMPLES = r'''
ipa_pass: topsecret
- name: Ensure role with certain details
ipa_role:
community.general.ipa_role:
name: another-role
description: Just another role
group:
@ -112,7 +112,7 @@ EXAMPLES = r'''
- service01
- name: Ensure role is absent
ipa_role:
community.general.ipa_role:
name: dba
state: absent
ipa_host: ipa.example.com

View file

@ -45,7 +45,7 @@ extends_documentation_fragment:
EXAMPLES = r'''
- name: Ensure service is present
ipa_service:
community.general.ipa_service:
name: http/host01.example.com
state: present
ipa_host: ipa.example.com
@ -53,7 +53,7 @@ EXAMPLES = r'''
ipa_pass: topsecret
- name: Ensure service is absent
ipa_service:
community.general.ipa_service:
name: http/host01.example.com
state: absent
ipa_host: ipa.example.com
@ -61,7 +61,7 @@ EXAMPLES = r'''
ipa_pass: topsecret
- name: Changing Managing hosts list
ipa_service:
community.general.ipa_service:
name: http/host01.example.com
host:
- host01.example.com

View file

@ -44,7 +44,7 @@ extends_documentation_fragment:
EXAMPLES = '''
- name: Ensure IPA Sub CA is present
ipa_subca:
community.general.ipa_subca:
ipa_host: spider.example.com
ipa_pass: Passw0rd!
state: present
@ -53,14 +53,14 @@ EXAMPLES = '''
subca_desc: Ansible Sub CA
- name: Ensure that IPA Sub CA is removed
ipa_subca:
community.general.ipa_subca:
ipa_host: spider.example.com
ipa_pass: Passw0rd!
state: absent
subca_name: AnsibleSubCA1
- name: Ensure that IPA Sub CA is disabled
ipa_subca:
community.general.ipa_subca:
ipa_host: spider.example.com
ipa_pass: Passw0rd!
state: disable

View file

@ -36,7 +36,7 @@ extends_documentation_fragment:
EXAMPLES = r'''
- name: Ensure sudo command exists
ipa_sudocmd:
community.general.ipa_sudocmd:
name: su
description: Allow to run su via sudo
ipa_host: ipa.example.com
@ -44,7 +44,7 @@ EXAMPLES = r'''
ipa_pass: topsecret
- name: Ensure sudo command does not exist
ipa_sudocmd:
community.general.ipa_sudocmd:
name: su
state: absent
ipa_host: ipa.example.com

View file

@ -43,7 +43,7 @@ extends_documentation_fragment:
EXAMPLES = r'''
- name: Ensure sudo command group exists
ipa_sudocmdgroup:
community.general.ipa_sudocmdgroup:
name: group01
description: Group of important commands
sudocmd:
@ -53,7 +53,7 @@ EXAMPLES = r'''
ipa_pass: topsecret
- name: Ensure sudo command group does not exist
ipa_sudocmdgroup:
community.general.ipa_sudocmdgroup:
name: group01
state: absent
ipa_host: ipa.example.com

View file

@ -106,7 +106,7 @@ extends_documentation_fragment:
EXAMPLES = r'''
- name: Ensure sudo rule is present that's allows all every body to execute any command on any host without being asked for a password.
ipa_sudorule:
community.general.ipa_sudorule:
name: sudo_all_nopasswd
cmdcategory: all
description: Allow to run every command with sudo without password
@ -119,7 +119,7 @@ EXAMPLES = r'''
ipa_pass: topsecret
- name: Ensure user group developers can run every command on host group db-server as well as on host db01.example.com.
ipa_sudorule:
community.general.ipa_sudorule:
name: sudo_dev_dbserver
description: Allow developers to run every command with sudo on all database server
cmdcategory: all

View file

@ -100,7 +100,7 @@ requirements:
EXAMPLES = r'''
- name: Ensure pinky is present and always reset password
ipa_user:
community.general.ipa_user:
name: pinky
state: present
krbpasswordexpiration: 20200119235959
@ -121,7 +121,7 @@ EXAMPLES = r'''
ipa_pass: topsecret
- name: Ensure brain is absent
ipa_user:
community.general.ipa_user:
name: brain
state: absent
ipa_host: ipa.example.com
@ -129,7 +129,7 @@ EXAMPLES = r'''
ipa_pass: topsecret
- name: Ensure pinky is present but don't reset password if already exists
ipa_user:
community.general.ipa_user:
name: pinky
state: present
givenname: Pinky

View file

@ -79,7 +79,7 @@ extends_documentation_fragment:
EXAMPLES = r'''
- name: Ensure vault is present
ipa_vault:
community.general.ipa_vault:
name: vault01
vault_type: standard
user: user01
@ -89,7 +89,7 @@ EXAMPLES = r'''
validate_certs: false
- name: Ensure vault is present for Admin user
ipa_vault:
community.general.ipa_vault:
name: vault01
vault_type: standard
ipa_host: ipa.example.com
@ -97,7 +97,7 @@ EXAMPLES = r'''
ipa_pass: topsecret
- name: Ensure vault is absent
ipa_vault:
community.general.ipa_vault:
name: vault01
vault_type: standard
user: user01
@ -107,7 +107,7 @@ EXAMPLES = r'''
ipa_pass: topsecret
- name: Modify vault if already exists
ipa_vault:
community.general.ipa_vault:
name: vault01
vault_type: standard
description: "Vault for test"
@ -117,7 +117,7 @@ EXAMPLES = r'''
replace: True
- name: Get vault info if already exists
ipa_vault:
community.general.ipa_vault:
name: vault01
ipa_host: ipa.example.com
ipa_user: admin