Normalize more booleans. (#5247) (#5250)

(cherry picked from commit 015566fb06)

Co-authored-by: Felix Fontein <felix@fontein.de>
This commit is contained in:
patchback[bot] 2022-09-06 21:07:46 +02:00 committed by GitHub
commit 8595601708
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
170 changed files with 465 additions and 465 deletions

View file

@ -112,8 +112,8 @@ EXAMPLES = r'''
ipa_host: ipa.example.com
ipa_user: admin
ipa_pass: topsecret
validate_certs: False
random_password: True
validate_certs: false
random_password: true
- name: Ensure host is disabled
community.general.ipa_host:
@ -146,7 +146,7 @@ EXAMPLES = r'''
ipa_host: ipa.example.com
ipa_user: admin
ipa_pass: topsecret
update_dns: True
update_dns: true
'''
RETURN = r'''

View file

@ -66,7 +66,7 @@ options:
description:
- Force replace the existent vault on IPA server.
type: bool
default: False
default: false
choices: ["True", "False"]
validate_certs:
description:
@ -115,7 +115,7 @@ EXAMPLES = r'''
ipa_host: ipa.example.com
ipa_user: admin
ipa_pass: topsecret
replace: True
replace: true
- name: Get vault info if already exists
community.general.ipa_vault:

View file

@ -596,7 +596,7 @@ EXAMPLES = '''
root_url: https://www.example.com/
admin_url: https://www.example.com/admin_url
base_url: basepath
enabled: True
enabled: true
client_authenticator_type: client-secret
secret: REALLYWELLKEPTSECRET
redirect_uris:
@ -605,20 +605,20 @@ EXAMPLES = '''
web_origins:
- https://www.example.com/*
not_before: 1507825725
bearer_only: False
consent_required: False
standard_flow_enabled: True
implicit_flow_enabled: False
direct_access_grants_enabled: False
service_accounts_enabled: False
authorization_services_enabled: False
public_client: False
frontchannel_logout: False
bearer_only: false
consent_required: false
standard_flow_enabled: true
implicit_flow_enabled: false
direct_access_grants_enabled: false
service_accounts_enabled: false
authorization_services_enabled: false
public_client: false
frontchannel_logout: false
protocol: openid-connect
full_scope_allowed: false
node_re_registration_timeout: -1
client_template: test
use_template_config: False
use_template_config: false
use_template_scope: false
use_template_mappers: false
always_display_in_console: true
@ -633,13 +633,13 @@ EXAMPLES = '''
browser: 4c90336b-bf1d-4b87-916d-3677ba4e5fbb
protocol_mappers:
- config:
access.token.claim: True
access.token.claim: true
claim.name: "family_name"
id.token.claim: True
id.token.claim: true
jsonType.label: String
user.attribute: lastName
userinfo.token.claim: True
consentRequired: True
userinfo.token.claim: true
consentRequired: true
consentText: "${familyName}"
name: family name
protocol: openid-connect
@ -653,14 +653,14 @@ EXAMPLES = '''
protocol: saml
protocolMapper: saml-role-list-mapper
attributes:
saml.authnstatement: True
saml.client.signature: True
saml.force.post.binding: True
saml.server.signature: True
saml.authnstatement: true
saml.client.signature: true
saml.force.post.binding: true
saml.server.signature: true
saml.signature.algorithm: RSA_SHA256
saml.signing.certificate: CERTIFICATEHERE
saml.signing.private.key: PRIVATEKEYHERE
saml_force_name_id_format: False
saml_force_name_id_format: false
saml_name_id_format: username
saml_signature_canonicalization_method: "http://www.w3.org/2001/10/xml-exc-c14n#"
user.info.response.signature.alg: RS256

View file

@ -228,12 +228,12 @@ EXAMPLES = '''
protocol: openid-connect
protocol_mappers:
- config:
access.token.claim: True
access.token.claim: true
claim.name: "family_name"
id.token.claim: True
id.token.claim: true
jsonType.label: String
user.attribute: lastName
userinfo.token.claim: True
userinfo.token.claim: true
name: family name
protocol: openid-connect
protocolMapper: oidc-usermodel-property-mapper

View file

@ -213,13 +213,13 @@ EXAMPLES = '''
name: this_is_a_test
protocol_mappers:
- config:
access.token.claim: True
access.token.claim: true
claim.name: "family_name"
id.token.claim: True
id.token.claim: true
jsonType.label: String
user.attribute: lastName
userinfo.token.claim: True
consentRequired: True
userinfo.token.claim: true
consentRequired: true
consentText: "${familyName}"
name: family name
protocol: openid-connect

View file

@ -55,7 +55,7 @@ options:
type: str
description:
- The name of the particular 1Password vault to search, useful if your 1Password user has access to multiple vaults (optional).
required: True
required: true
auto_login:
type: dict
description:
@ -80,18 +80,18 @@ options:
description:
- The master password for your subdomain.
- This is always required when specifying C(auto_login).
required: True
required: true
secret_key:
type: str
description:
- The secret key for your subdomain.
- Only required for initial sign in.
default: {}
required: False
required: false
cli_path:
type: path
description: Used to specify the exact path to the C(op) command line interface
required: False
required: false
default: 'op'
'''
@ -114,7 +114,7 @@ EXAMPLES = '''
vault: Name of the vault # optional, only necessary if there is more than 1 Vault available
delegate_to: localhost
register: my_1password_item
no_log: True # Don't want to log the secrets to the console!
no_log: true # Don't want to log the secrets to the console!
# Gather secrets combining simple and advanced search terms to retrieve two items, one of which we fetch two
# fields. In the first 'password' is fetched, as a field name is not specified (default behaviour) and in the