From 2ff06d2fdf04ab29c461d3613340e6f4512dc735 Mon Sep 17 00:00:00 2001 From: "patchback[bot]" <45432694+patchback[bot]@users.noreply.github.com> Date: Mon, 26 Oct 2020 10:32:34 +0300 Subject: [PATCH] postgresql modules: Fix documentation of trust_input parameter (#1170) (#1172) * Fix yes/no typos * Further doc improvements for consistency (cherry picked from commit 9aeac265838a3efeff1c1ab221fe0f3e767b61b2) Co-authored-by: Peter Zahemszky <29452238+pzahemszky@users.noreply.github.com> --- plugins/modules/database/postgresql/postgresql_copy.py | 2 +- plugins/modules/database/postgresql/postgresql_db.py | 2 +- plugins/modules/database/postgresql/postgresql_ext.py | 2 +- plugins/modules/database/postgresql/postgresql_idx.py | 2 +- plugins/modules/database/postgresql/postgresql_info.py | 2 +- plugins/modules/database/postgresql/postgresql_lang.py | 2 +- plugins/modules/database/postgresql/postgresql_membership.py | 2 +- plugins/modules/database/postgresql/postgresql_owner.py | 2 +- plugins/modules/database/postgresql/postgresql_ping.py | 2 +- plugins/modules/database/postgresql/postgresql_privs.py | 2 +- plugins/modules/database/postgresql/postgresql_publication.py | 2 +- plugins/modules/database/postgresql/postgresql_query.py | 2 +- plugins/modules/database/postgresql/postgresql_schema.py | 2 +- plugins/modules/database/postgresql/postgresql_sequence.py | 2 +- plugins/modules/database/postgresql/postgresql_set.py | 2 +- plugins/modules/database/postgresql/postgresql_slot.py | 2 +- plugins/modules/database/postgresql/postgresql_table.py | 2 +- plugins/modules/database/postgresql/postgresql_tablespace.py | 2 +- plugins/modules/database/postgresql/postgresql_user.py | 2 +- .../database/postgresql/postgresql_user_obj_stat_info.py | 2 +- 20 files changed, 20 insertions(+), 20 deletions(-) diff --git a/plugins/modules/database/postgresql/postgresql_copy.py b/plugins/modules/database/postgresql/postgresql_copy.py index 190a0bf22c..bf66f3d4b7 100644 --- a/plugins/modules/database/postgresql/postgresql_copy.py +++ b/plugins/modules/database/postgresql/postgresql_copy.py @@ -72,7 +72,7 @@ options: trust_input: description: - If C(no), check whether values of parameters are potentially dangerous. - - It makes sense to use C(yes) only when SQL injections are possible. + - It makes sense to use C(no) only when SQL injections are possible. type: bool default: yes version_added: '0.2.0' diff --git a/plugins/modules/database/postgresql/postgresql_db.py b/plugins/modules/database/postgresql/postgresql_db.py index c9eb21c778..8fde39ec00 100644 --- a/plugins/modules/database/postgresql/postgresql_db.py +++ b/plugins/modules/database/postgresql/postgresql_db.py @@ -107,7 +107,7 @@ options: description: - If C(no), check whether values of parameters I(owner), I(conn_limit), I(encoding), I(db), I(template), I(tablespace), I(session_role) are potentially dangerous. - - It makes sense to use C(yes) only when SQL injections via the parameters are possible. + - It makes sense to use C(no) only when SQL injections via the parameters are possible. type: bool default: yes version_added: '0.2.0' diff --git a/plugins/modules/database/postgresql/postgresql_ext.py b/plugins/modules/database/postgresql/postgresql_ext.py index 2ca25f7ab0..3fa82daccd 100644 --- a/plugins/modules/database/postgresql/postgresql_ext.py +++ b/plugins/modules/database/postgresql/postgresql_ext.py @@ -80,7 +80,7 @@ options: description: - If C(no), check whether values of parameters I(ext), I(schema), I(version), I(session_role) are potentially dangerous. - - It makes sense to use C(yes) only when SQL injections via the parameters are possible. + - It makes sense to use C(no) only when SQL injections via the parameters are possible. type: bool default: yes version_added: '0.2.0' diff --git a/plugins/modules/database/postgresql/postgresql_idx.py b/plugins/modules/database/postgresql/postgresql_idx.py index 4d699654de..6ffee31da6 100644 --- a/plugins/modules/database/postgresql/postgresql_idx.py +++ b/plugins/modules/database/postgresql/postgresql_idx.py @@ -114,7 +114,7 @@ options: - If C(no), check whether values of parameters I(idxname), I(session_role), I(schema), I(table), I(columns), I(tablespace), I(storage_params), I(cond) are potentially dangerous. - - It makes sense to use C(yes) only when SQL injections via the parameters are possible. + - It makes sense to use C(no) only when SQL injections via the parameters are possible. type: bool default: yes version_added: '0.2.0' diff --git a/plugins/modules/database/postgresql/postgresql_info.py b/plugins/modules/database/postgresql/postgresql_info.py index 14047c22bf..aeec865170 100644 --- a/plugins/modules/database/postgresql/postgresql_info.py +++ b/plugins/modules/database/postgresql/postgresql_info.py @@ -43,7 +43,7 @@ options: trust_input: description: - If C(no), check whether a value of I(session_role) is potentially dangerous. - - It makes sense to use C(yes) only when SQL injections via I(session_role) are possible. + - It makes sense to use C(no) only when SQL injections via I(session_role) are possible. type: bool default: yes version_added: '0.2.0' diff --git a/plugins/modules/database/postgresql/postgresql_lang.py b/plugins/modules/database/postgresql/postgresql_lang.py index d989e4b1c6..8b28cd9c5e 100644 --- a/plugins/modules/database/postgresql/postgresql_lang.py +++ b/plugins/modules/database/postgresql/postgresql_lang.py @@ -106,7 +106,7 @@ options: description: - If C(no), check whether values of parameters I(lang), I(session_role), I(owner) are potentially dangerous. - - It makes sense to use C(yes) only when SQL injections via the parameters are possible. + - It makes sense to use C(no) only when SQL injections via the parameters are possible. type: bool default: yes version_added: '0.2.0' diff --git a/plugins/modules/database/postgresql/postgresql_membership.py b/plugins/modules/database/postgresql/postgresql_membership.py index bd74202f59..3292a6db13 100644 --- a/plugins/modules/database/postgresql/postgresql_membership.py +++ b/plugins/modules/database/postgresql/postgresql_membership.py @@ -70,7 +70,7 @@ options: description: - If C(no), check whether values of parameters I(groups), I(target_roles), I(session_role) are potentially dangerous. - - It makes sense to use C(yes) only when SQL injections via the parameters are possible. + - It makes sense to use C(no) only when SQL injections via the parameters are possible. type: bool default: yes version_added: '0.2.0' diff --git a/plugins/modules/database/postgresql/postgresql_owner.py b/plugins/modules/database/postgresql/postgresql_owner.py index b62ed13418..06a09c5956 100644 --- a/plugins/modules/database/postgresql/postgresql_owner.py +++ b/plugins/modules/database/postgresql/postgresql_owner.py @@ -68,7 +68,7 @@ options: description: - If C(no), check whether values of parameters I(new_owner), I(obj_name), I(reassign_owned_by), I(session_role) are potentially dangerous. - - It makes sense to use C(yes) only when SQL injections via the parameters are possible. + - It makes sense to use C(no) only when SQL injections via the parameters are possible. type: bool default: yes version_added: '0.2.0' diff --git a/plugins/modules/database/postgresql/postgresql_ping.py b/plugins/modules/database/postgresql/postgresql_ping.py index 1236617b2b..240cea579f 100644 --- a/plugins/modules/database/postgresql/postgresql_ping.py +++ b/plugins/modules/database/postgresql/postgresql_ping.py @@ -31,7 +31,7 @@ options: trust_input: description: - If C(no), check whether a value of I(session_role) is potentially dangerous. - - It does make sense to use C(yes) only when SQL injections via I(session_role) are possible. + - It makes sense to use C(no) only when SQL injections via I(session_role) are possible. type: bool default: yes version_added: '0.2.0' diff --git a/plugins/modules/database/postgresql/postgresql_privs.py b/plugins/modules/database/postgresql/postgresql_privs.py index 58ae0911b2..e8d64f36a2 100644 --- a/plugins/modules/database/postgresql/postgresql_privs.py +++ b/plugins/modules/database/postgresql/postgresql_privs.py @@ -159,7 +159,7 @@ options: description: - If C(no), check whether values of parameters I(roles), I(target_roles), I(session_role), I(schema) are potentially dangerous. - - It makes sense to use C(yes) only when SQL injections via the parameters are possible. + - It makes sense to use C(no) only when SQL injections via the parameters are possible. type: bool default: yes version_added: '0.2.0' diff --git a/plugins/modules/database/postgresql/postgresql_publication.py b/plugins/modules/database/postgresql/postgresql_publication.py index 1fad35ce7b..1db80adc0a 100644 --- a/plugins/modules/database/postgresql/postgresql_publication.py +++ b/plugins/modules/database/postgresql/postgresql_publication.py @@ -69,7 +69,7 @@ options: description: - If C(no), check whether values of parameters I(name), I(tables), I(owner), I(session_role), I(params) are potentially dangerous. - - It makes sense to use C(yes) only when SQL injections via the parameters are possible. + - It makes sense to use C(no) only when SQL injections via the parameters are possible. type: bool default: yes version_added: '0.2.0' diff --git a/plugins/modules/database/postgresql/postgresql_query.py b/plugins/modules/database/postgresql/postgresql_query.py index dbe453f855..e231fbd3c9 100644 --- a/plugins/modules/database/postgresql/postgresql_query.py +++ b/plugins/modules/database/postgresql/postgresql_query.py @@ -71,7 +71,7 @@ options: trust_input: description: - If C(no), check whether a value of I(session_role) is potentially dangerous. - - It does make sense to use C(yes) only when SQL injections via I(session_role) are possible. + - It makes sense to use C(no) only when SQL injections via I(session_role) are possible. type: bool default: yes version_added: '0.2.0' diff --git a/plugins/modules/database/postgresql/postgresql_schema.py b/plugins/modules/database/postgresql/postgresql_schema.py index 346f84a4a0..e7f28ecf14 100644 --- a/plugins/modules/database/postgresql/postgresql_schema.py +++ b/plugins/modules/database/postgresql/postgresql_schema.py @@ -68,7 +68,7 @@ options: trust_input: description: - If C(no), check whether values of parameters I(schema), I(owner), I(session_role) are potentially dangerous. - - It makes sense to use C(yes) only when SQL injections via the parameters are possible. + - It makes sense to use C(no) only when SQL injections via the parameters are possible. type: bool default: yes version_added: '0.2.0' diff --git a/plugins/modules/database/postgresql/postgresql_sequence.py b/plugins/modules/database/postgresql/postgresql_sequence.py index 2905717043..50cd628ac8 100644 --- a/plugins/modules/database/postgresql/postgresql_sequence.py +++ b/plugins/modules/database/postgresql/postgresql_sequence.py @@ -133,7 +133,7 @@ options: description: - If C(no), check whether values of parameters I(sequence), I(schema), I(rename_to), I(owner), I(newschema), I(session_role) are potentially dangerous. - - It makes sense to use C(yes) only when SQL injections via the parameters are possible. + - It makes sense to use C(no) only when SQL injections via the parameters are possible. type: bool default: yes version_added: '0.2.0' diff --git a/plugins/modules/database/postgresql/postgresql_set.py b/plugins/modules/database/postgresql/postgresql_set.py index 4f610f6c8a..f04ba7ed6f 100644 --- a/plugins/modules/database/postgresql/postgresql_set.py +++ b/plugins/modules/database/postgresql/postgresql_set.py @@ -56,7 +56,7 @@ options: trust_input: description: - If C(no), check whether values of parameters are potentially dangerous. - - It does make sense to use C(yes) only when SQL injections are possible. + - It makes sense to use C(no) only when SQL injections are possible. type: bool default: yes version_added: '0.2.0' diff --git a/plugins/modules/database/postgresql/postgresql_slot.py b/plugins/modules/database/postgresql/postgresql_slot.py index a01653ddbc..435a6c5910 100644 --- a/plugins/modules/database/postgresql/postgresql_slot.py +++ b/plugins/modules/database/postgresql/postgresql_slot.py @@ -69,7 +69,7 @@ options: trust_input: description: - If C(no), check the value of I(session_role) is potentially dangerous. - - It sense to use C(no) only when SQL injections via I(session_role) are possible. + - It makes sense to use C(no) only when SQL injections via I(session_role) are possible. type: bool default: yes version_added: '0.2.0' diff --git a/plugins/modules/database/postgresql/postgresql_table.py b/plugins/modules/database/postgresql/postgresql_table.py index 0ede2d0452..5260853d4d 100644 --- a/plugins/modules/database/postgresql/postgresql_table.py +++ b/plugins/modules/database/postgresql/postgresql_table.py @@ -96,7 +96,7 @@ options: trust_input: description: - If C(no), check whether values of parameters are potentially dangerous. - - It makes sense to use C(yes) only when SQL injections are possible. + - It makes sense to use C(no) only when SQL injections are possible. type: bool default: yes version_added: '0.2.0' diff --git a/plugins/modules/database/postgresql/postgresql_tablespace.py b/plugins/modules/database/postgresql/postgresql_tablespace.py index c5d64262d9..2062e6a132 100644 --- a/plugins/modules/database/postgresql/postgresql_tablespace.py +++ b/plugins/modules/database/postgresql/postgresql_tablespace.py @@ -73,7 +73,7 @@ options: description: - If C(no), check whether values of parameters I(tablespace), I(location), I(owner), I(rename_to), I(session_role), I(settings_list) are potentially dangerous. - - It makes sense to use C(yes) only when SQL injections via the parameters are possible. + - It makes sense to use C(no) only when SQL injections via the parameters are possible. type: bool default: yes version_added: '0.2.0' diff --git a/plugins/modules/database/postgresql/postgresql_user.py b/plugins/modules/database/postgresql/postgresql_user.py index f6d753b290..32d73d29e4 100644 --- a/plugins/modules/database/postgresql/postgresql_user.py +++ b/plugins/modules/database/postgresql/postgresql_user.py @@ -143,7 +143,7 @@ options: description: - If C(no), checks whether values of options I(name), I(password), I(privs), I(expires), I(role_attr_flags), I(groups), I(comment), I(session_role) are potentially dangerous. - - It makes sense to use C(yes) only when SQL injections through the options are possible. + - It makes sense to use C(no) only when SQL injections through the options are possible. type: bool default: yes version_added: '0.2.0' diff --git a/plugins/modules/database/postgresql/postgresql_user_obj_stat_info.py b/plugins/modules/database/postgresql/postgresql_user_obj_stat_info.py index 7a59e6c8f4..9d03408e41 100644 --- a/plugins/modules/database/postgresql/postgresql_user_obj_stat_info.py +++ b/plugins/modules/database/postgresql/postgresql_user_obj_stat_info.py @@ -43,7 +43,7 @@ options: trust_input: description: - If C(no), check the value of I(session_role) is potentially dangerous. - - It only makes sense to use C(no) only when SQL injections via I(session_role) are possible. + - It makes sense to use C(no) only when SQL injections via I(session_role) are possible. type: bool default: yes version_added: '0.2.0'