mirror of
https://github.com/ansible-collections/community.general.git
synced 2024-09-14 20:13:21 +02:00
* Fix yes/no typos
* Further doc improvements for consistency
(cherry picked from commit 9aeac26583
)
Co-authored-by: Peter Zahemszky <29452238+pzahemszky@users.noreply.github.com>
This commit is contained in:
parent
3a69dd949d
commit
2ff06d2fdf
20 changed files with 20 additions and 20 deletions
|
@ -72,7 +72,7 @@ options:
|
||||||
trust_input:
|
trust_input:
|
||||||
description:
|
description:
|
||||||
- If C(no), check whether values of parameters are potentially dangerous.
|
- If C(no), check whether values of parameters are potentially dangerous.
|
||||||
- It makes sense to use C(yes) only when SQL injections are possible.
|
- It makes sense to use C(no) only when SQL injections are possible.
|
||||||
type: bool
|
type: bool
|
||||||
default: yes
|
default: yes
|
||||||
version_added: '0.2.0'
|
version_added: '0.2.0'
|
||||||
|
|
|
@ -107,7 +107,7 @@ options:
|
||||||
description:
|
description:
|
||||||
- If C(no), check whether values of parameters I(owner), I(conn_limit), I(encoding),
|
- If C(no), check whether values of parameters I(owner), I(conn_limit), I(encoding),
|
||||||
I(db), I(template), I(tablespace), I(session_role) are potentially dangerous.
|
I(db), I(template), I(tablespace), I(session_role) are potentially dangerous.
|
||||||
- It makes sense to use C(yes) only when SQL injections via the parameters are possible.
|
- It makes sense to use C(no) only when SQL injections via the parameters are possible.
|
||||||
type: bool
|
type: bool
|
||||||
default: yes
|
default: yes
|
||||||
version_added: '0.2.0'
|
version_added: '0.2.0'
|
||||||
|
|
|
@ -80,7 +80,7 @@ options:
|
||||||
description:
|
description:
|
||||||
- If C(no), check whether values of parameters I(ext), I(schema),
|
- If C(no), check whether values of parameters I(ext), I(schema),
|
||||||
I(version), I(session_role) are potentially dangerous.
|
I(version), I(session_role) are potentially dangerous.
|
||||||
- It makes sense to use C(yes) only when SQL injections via the parameters are possible.
|
- It makes sense to use C(no) only when SQL injections via the parameters are possible.
|
||||||
type: bool
|
type: bool
|
||||||
default: yes
|
default: yes
|
||||||
version_added: '0.2.0'
|
version_added: '0.2.0'
|
||||||
|
|
|
@ -114,7 +114,7 @@ options:
|
||||||
- If C(no), check whether values of parameters I(idxname), I(session_role),
|
- If C(no), check whether values of parameters I(idxname), I(session_role),
|
||||||
I(schema), I(table), I(columns), I(tablespace), I(storage_params),
|
I(schema), I(table), I(columns), I(tablespace), I(storage_params),
|
||||||
I(cond) are potentially dangerous.
|
I(cond) are potentially dangerous.
|
||||||
- It makes sense to use C(yes) only when SQL injections via the parameters are possible.
|
- It makes sense to use C(no) only when SQL injections via the parameters are possible.
|
||||||
type: bool
|
type: bool
|
||||||
default: yes
|
default: yes
|
||||||
version_added: '0.2.0'
|
version_added: '0.2.0'
|
||||||
|
|
|
@ -43,7 +43,7 @@ options:
|
||||||
trust_input:
|
trust_input:
|
||||||
description:
|
description:
|
||||||
- If C(no), check whether a value of I(session_role) is potentially dangerous.
|
- If C(no), check whether a value of I(session_role) is potentially dangerous.
|
||||||
- It makes sense to use C(yes) only when SQL injections via I(session_role) are possible.
|
- It makes sense to use C(no) only when SQL injections via I(session_role) are possible.
|
||||||
type: bool
|
type: bool
|
||||||
default: yes
|
default: yes
|
||||||
version_added: '0.2.0'
|
version_added: '0.2.0'
|
||||||
|
|
|
@ -106,7 +106,7 @@ options:
|
||||||
description:
|
description:
|
||||||
- If C(no), check whether values of parameters I(lang), I(session_role),
|
- If C(no), check whether values of parameters I(lang), I(session_role),
|
||||||
I(owner) are potentially dangerous.
|
I(owner) are potentially dangerous.
|
||||||
- It makes sense to use C(yes) only when SQL injections via the parameters are possible.
|
- It makes sense to use C(no) only when SQL injections via the parameters are possible.
|
||||||
type: bool
|
type: bool
|
||||||
default: yes
|
default: yes
|
||||||
version_added: '0.2.0'
|
version_added: '0.2.0'
|
||||||
|
|
|
@ -70,7 +70,7 @@ options:
|
||||||
description:
|
description:
|
||||||
- If C(no), check whether values of parameters I(groups),
|
- If C(no), check whether values of parameters I(groups),
|
||||||
I(target_roles), I(session_role) are potentially dangerous.
|
I(target_roles), I(session_role) are potentially dangerous.
|
||||||
- It makes sense to use C(yes) only when SQL injections via the parameters are possible.
|
- It makes sense to use C(no) only when SQL injections via the parameters are possible.
|
||||||
type: bool
|
type: bool
|
||||||
default: yes
|
default: yes
|
||||||
version_added: '0.2.0'
|
version_added: '0.2.0'
|
||||||
|
|
|
@ -68,7 +68,7 @@ options:
|
||||||
description:
|
description:
|
||||||
- If C(no), check whether values of parameters I(new_owner), I(obj_name),
|
- If C(no), check whether values of parameters I(new_owner), I(obj_name),
|
||||||
I(reassign_owned_by), I(session_role) are potentially dangerous.
|
I(reassign_owned_by), I(session_role) are potentially dangerous.
|
||||||
- It makes sense to use C(yes) only when SQL injections via the parameters are possible.
|
- It makes sense to use C(no) only when SQL injections via the parameters are possible.
|
||||||
type: bool
|
type: bool
|
||||||
default: yes
|
default: yes
|
||||||
version_added: '0.2.0'
|
version_added: '0.2.0'
|
||||||
|
|
|
@ -31,7 +31,7 @@ options:
|
||||||
trust_input:
|
trust_input:
|
||||||
description:
|
description:
|
||||||
- If C(no), check whether a value of I(session_role) is potentially dangerous.
|
- If C(no), check whether a value of I(session_role) is potentially dangerous.
|
||||||
- It does make sense to use C(yes) only when SQL injections via I(session_role) are possible.
|
- It makes sense to use C(no) only when SQL injections via I(session_role) are possible.
|
||||||
type: bool
|
type: bool
|
||||||
default: yes
|
default: yes
|
||||||
version_added: '0.2.0'
|
version_added: '0.2.0'
|
||||||
|
|
|
@ -159,7 +159,7 @@ options:
|
||||||
description:
|
description:
|
||||||
- If C(no), check whether values of parameters I(roles), I(target_roles), I(session_role),
|
- If C(no), check whether values of parameters I(roles), I(target_roles), I(session_role),
|
||||||
I(schema) are potentially dangerous.
|
I(schema) are potentially dangerous.
|
||||||
- It makes sense to use C(yes) only when SQL injections via the parameters are possible.
|
- It makes sense to use C(no) only when SQL injections via the parameters are possible.
|
||||||
type: bool
|
type: bool
|
||||||
default: yes
|
default: yes
|
||||||
version_added: '0.2.0'
|
version_added: '0.2.0'
|
||||||
|
|
|
@ -69,7 +69,7 @@ options:
|
||||||
description:
|
description:
|
||||||
- If C(no), check whether values of parameters I(name), I(tables), I(owner),
|
- If C(no), check whether values of parameters I(name), I(tables), I(owner),
|
||||||
I(session_role), I(params) are potentially dangerous.
|
I(session_role), I(params) are potentially dangerous.
|
||||||
- It makes sense to use C(yes) only when SQL injections via the parameters are possible.
|
- It makes sense to use C(no) only when SQL injections via the parameters are possible.
|
||||||
type: bool
|
type: bool
|
||||||
default: yes
|
default: yes
|
||||||
version_added: '0.2.0'
|
version_added: '0.2.0'
|
||||||
|
|
|
@ -71,7 +71,7 @@ options:
|
||||||
trust_input:
|
trust_input:
|
||||||
description:
|
description:
|
||||||
- If C(no), check whether a value of I(session_role) is potentially dangerous.
|
- If C(no), check whether a value of I(session_role) is potentially dangerous.
|
||||||
- It does make sense to use C(yes) only when SQL injections via I(session_role) are possible.
|
- It makes sense to use C(no) only when SQL injections via I(session_role) are possible.
|
||||||
type: bool
|
type: bool
|
||||||
default: yes
|
default: yes
|
||||||
version_added: '0.2.0'
|
version_added: '0.2.0'
|
||||||
|
|
|
@ -68,7 +68,7 @@ options:
|
||||||
trust_input:
|
trust_input:
|
||||||
description:
|
description:
|
||||||
- If C(no), check whether values of parameters I(schema), I(owner), I(session_role) are potentially dangerous.
|
- If C(no), check whether values of parameters I(schema), I(owner), I(session_role) are potentially dangerous.
|
||||||
- It makes sense to use C(yes) only when SQL injections via the parameters are possible.
|
- It makes sense to use C(no) only when SQL injections via the parameters are possible.
|
||||||
type: bool
|
type: bool
|
||||||
default: yes
|
default: yes
|
||||||
version_added: '0.2.0'
|
version_added: '0.2.0'
|
||||||
|
|
|
@ -133,7 +133,7 @@ options:
|
||||||
description:
|
description:
|
||||||
- If C(no), check whether values of parameters I(sequence), I(schema), I(rename_to),
|
- If C(no), check whether values of parameters I(sequence), I(schema), I(rename_to),
|
||||||
I(owner), I(newschema), I(session_role) are potentially dangerous.
|
I(owner), I(newschema), I(session_role) are potentially dangerous.
|
||||||
- It makes sense to use C(yes) only when SQL injections via the parameters are possible.
|
- It makes sense to use C(no) only when SQL injections via the parameters are possible.
|
||||||
type: bool
|
type: bool
|
||||||
default: yes
|
default: yes
|
||||||
version_added: '0.2.0'
|
version_added: '0.2.0'
|
||||||
|
|
|
@ -56,7 +56,7 @@ options:
|
||||||
trust_input:
|
trust_input:
|
||||||
description:
|
description:
|
||||||
- If C(no), check whether values of parameters are potentially dangerous.
|
- If C(no), check whether values of parameters are potentially dangerous.
|
||||||
- It does make sense to use C(yes) only when SQL injections are possible.
|
- It makes sense to use C(no) only when SQL injections are possible.
|
||||||
type: bool
|
type: bool
|
||||||
default: yes
|
default: yes
|
||||||
version_added: '0.2.0'
|
version_added: '0.2.0'
|
||||||
|
|
|
@ -69,7 +69,7 @@ options:
|
||||||
trust_input:
|
trust_input:
|
||||||
description:
|
description:
|
||||||
- If C(no), check the value of I(session_role) is potentially dangerous.
|
- If C(no), check the value of I(session_role) is potentially dangerous.
|
||||||
- It sense to use C(no) only when SQL injections via I(session_role) are possible.
|
- It makes sense to use C(no) only when SQL injections via I(session_role) are possible.
|
||||||
type: bool
|
type: bool
|
||||||
default: yes
|
default: yes
|
||||||
version_added: '0.2.0'
|
version_added: '0.2.0'
|
||||||
|
|
|
@ -96,7 +96,7 @@ options:
|
||||||
trust_input:
|
trust_input:
|
||||||
description:
|
description:
|
||||||
- If C(no), check whether values of parameters are potentially dangerous.
|
- If C(no), check whether values of parameters are potentially dangerous.
|
||||||
- It makes sense to use C(yes) only when SQL injections are possible.
|
- It makes sense to use C(no) only when SQL injections are possible.
|
||||||
type: bool
|
type: bool
|
||||||
default: yes
|
default: yes
|
||||||
version_added: '0.2.0'
|
version_added: '0.2.0'
|
||||||
|
|
|
@ -73,7 +73,7 @@ options:
|
||||||
description:
|
description:
|
||||||
- If C(no), check whether values of parameters I(tablespace), I(location), I(owner),
|
- If C(no), check whether values of parameters I(tablespace), I(location), I(owner),
|
||||||
I(rename_to), I(session_role), I(settings_list) are potentially dangerous.
|
I(rename_to), I(session_role), I(settings_list) are potentially dangerous.
|
||||||
- It makes sense to use C(yes) only when SQL injections via the parameters are possible.
|
- It makes sense to use C(no) only when SQL injections via the parameters are possible.
|
||||||
type: bool
|
type: bool
|
||||||
default: yes
|
default: yes
|
||||||
version_added: '0.2.0'
|
version_added: '0.2.0'
|
||||||
|
|
|
@ -143,7 +143,7 @@ options:
|
||||||
description:
|
description:
|
||||||
- If C(no), checks whether values of options I(name), I(password), I(privs), I(expires),
|
- If C(no), checks whether values of options I(name), I(password), I(privs), I(expires),
|
||||||
I(role_attr_flags), I(groups), I(comment), I(session_role) are potentially dangerous.
|
I(role_attr_flags), I(groups), I(comment), I(session_role) are potentially dangerous.
|
||||||
- It makes sense to use C(yes) only when SQL injections through the options are possible.
|
- It makes sense to use C(no) only when SQL injections through the options are possible.
|
||||||
type: bool
|
type: bool
|
||||||
default: yes
|
default: yes
|
||||||
version_added: '0.2.0'
|
version_added: '0.2.0'
|
||||||
|
|
|
@ -43,7 +43,7 @@ options:
|
||||||
trust_input:
|
trust_input:
|
||||||
description:
|
description:
|
||||||
- If C(no), check the value of I(session_role) is potentially dangerous.
|
- If C(no), check the value of I(session_role) is potentially dangerous.
|
||||||
- It only makes sense to use C(no) only when SQL injections via I(session_role) are possible.
|
- It makes sense to use C(no) only when SQL injections via I(session_role) are possible.
|
||||||
type: bool
|
type: bool
|
||||||
default: yes
|
default: yes
|
||||||
version_added: '0.2.0'
|
version_added: '0.2.0'
|
||||||
|
|
Loading…
Reference in a new issue