diff --git a/branch/main/openssh_cert_module.html b/branch/main/openssh_cert_module.html index abb4ffaf..b397f513 100644 --- a/branch/main/openssh_cert_module.html +++ b/branch/main/openssh_cert_module.html @@ -280,12 +280,12 @@ see
any
The permissions the resulting filesystem object should have.
-For those used to /usr/bin/chmod remember that modes are actually octal numbers. You must give Ansible enough information to parse them correctly. For consistent results, quote octal numbers (for example, '644' or '1777') so Ansible receives a string and can do its own conversion from string into number. Adding a leading zero (for example, 0755) works sometimes, but can fail in loops and some other circumstances.
For those used to /usr/bin/chmod remember that modes are actually octal numbers. You must give Ansible enough information to parse them correctly. For consistent results, quote octal numbers (for example, '644' or '1777') so Ansible receives a string and can do its own conversion from string into number. Adding a leading zero (for example, 0755) works sometimes, but can fail in loops and some other circumstances.
Giving Ansible a number without following either of these rules will end up with a decimal number which will have unexpected results.
-As of Ansible 1.8, the mode may be specified as a symbolic mode (for example, u+rwx or u=rw,g=r,o=r).
If mode is not specified and the destination filesystem object does not exist, the default umask on the system will be used when setting the mode for the newly created filesystem object.
If mode is not specified and the destination filesystem object does exist, the mode of the existing filesystem object will be used.
Specifying mode is the best way to ensure filesystem objects are created with the correct permissions. See CVE-2020-1736 for further details.
As of Ansible 1.8, the mode may be specified as a symbolic mode (for example, u+rwx or u=rw,g=r,o=r).
If mode is not specified and the destination filesystem object does not exist, the default umask on the system will be used when setting the mode for the newly created filesystem object.
If mode is not specified and the destination filesystem object does exist, the mode of the existing filesystem object will be used.
Specifying mode is the best way to ensure filesystem objects are created with the correct permissions. See CVE-2020-1736 for further details.
The role part of the SELinux filesystem object context.
-When set to _default, it will use the role portion of the policy if available.
When set to _default, it will use the role portion of the policy if available.
The type part of the SELinux filesystem object context.
-When set to _default, it will use the type portion of the policy if available.
When set to _default, it will use the type portion of the policy if available.
The user part of the SELinux filesystem object context.
-By default it uses the system policy, where applicable.
When set to _default, it will use the user portion of the policy if available.
By default it uses the system policy, where applicable.
When set to _default, it will use the user portion of the policy if available.
The permissions the resulting filesystem object should have.
-For those used to /usr/bin/chmod remember that modes are actually octal numbers. You must give Ansible enough information to parse them correctly. For consistent results, quote octal numbers (for example, '644' or '1777') so Ansible receives a string and can do its own conversion from string into number. Adding a leading zero (for example, 0755) works sometimes, but can fail in loops and some other circumstances.
For those used to /usr/bin/chmod remember that modes are actually octal numbers. You must give Ansible enough information to parse them correctly. For consistent results, quote octal numbers (for example, '644' or '1777') so Ansible receives a string and can do its own conversion from string into number. Adding a leading zero (for example, 0755) works sometimes, but can fail in loops and some other circumstances.
Giving Ansible a number without following either of these rules will end up with a decimal number which will have unexpected results.
-As of Ansible 1.8, the mode may be specified as a symbolic mode (for example, u+rwx or u=rw,g=r,o=r).
If mode is not specified and the destination filesystem object does not exist, the default umask on the system will be used when setting the mode for the newly created filesystem object.
If mode is not specified and the destination filesystem object does exist, the mode of the existing filesystem object will be used.
Specifying mode is the best way to ensure filesystem objects are created with the correct permissions. See CVE-2020-1736 for further details.
As of Ansible 1.8, the mode may be specified as a symbolic mode (for example, u+rwx or u=rw,g=r,o=r).
If mode is not specified and the destination filesystem object does not exist, the default umask on the system will be used when setting the mode for the newly created filesystem object.
If mode is not specified and the destination filesystem object does exist, the mode of the existing filesystem object will be used.
Specifying mode is the best way to ensure filesystem objects are created with the correct permissions. See CVE-2020-1736 for further details.
The role part of the SELinux filesystem object context.
-When set to _default, it will use the role portion of the policy if available.
When set to _default, it will use the role portion of the policy if available.
The type part of the SELinux filesystem object context.
-When set to _default, it will use the type portion of the policy if available.
When set to _default, it will use the type portion of the policy if available.
The user part of the SELinux filesystem object context.
-By default it uses the system policy, where applicable.
When set to _default, it will use the user portion of the policy if available.
By default it uses the system policy, where applicable.
When set to _default, it will use the user portion of the policy if available.
The permissions the resulting filesystem object should have.
-For those used to /usr/bin/chmod remember that modes are actually octal numbers. You must give Ansible enough information to parse them correctly. For consistent results, quote octal numbers (for example, '644' or '1777') so Ansible receives a string and can do its own conversion from string into number. Adding a leading zero (for example, 0755) works sometimes, but can fail in loops and some other circumstances.
For those used to /usr/bin/chmod remember that modes are actually octal numbers. You must give Ansible enough information to parse them correctly. For consistent results, quote octal numbers (for example, '644' or '1777') so Ansible receives a string and can do its own conversion from string into number. Adding a leading zero (for example, 0755) works sometimes, but can fail in loops and some other circumstances.
Giving Ansible a number without following either of these rules will end up with a decimal number which will have unexpected results.
-As of Ansible 1.8, the mode may be specified as a symbolic mode (for example, u+rwx or u=rw,g=r,o=r).
If mode is not specified and the destination filesystem object does not exist, the default umask on the system will be used when setting the mode for the newly created filesystem object.
If mode is not specified and the destination filesystem object does exist, the mode of the existing filesystem object will be used.
Specifying mode is the best way to ensure filesystem objects are created with the correct permissions. See CVE-2020-1736 for further details.
As of Ansible 1.8, the mode may be specified as a symbolic mode (for example, u+rwx or u=rw,g=r,o=r).
If mode is not specified and the destination filesystem object does not exist, the default umask on the system will be used when setting the mode for the newly created filesystem object.
If mode is not specified and the destination filesystem object does exist, the mode of the existing filesystem object will be used.
Specifying mode is the best way to ensure filesystem objects are created with the correct permissions. See CVE-2020-1736 for further details.
The role part of the SELinux filesystem object context.
-When set to _default, it will use the role portion of the policy if available.
When set to _default, it will use the role portion of the policy if available.
The type part of the SELinux filesystem object context.
-When set to _default, it will use the type portion of the policy if available.
When set to _default, it will use the type portion of the policy if available.
The user part of the SELinux filesystem object context.
-By default it uses the system policy, where applicable.
When set to _default, it will use the user portion of the policy if available.
By default it uses the system policy, where applicable.
When set to _default, it will use the user portion of the policy if available.
The permissions the resulting filesystem object should have.
-For those used to /usr/bin/chmod remember that modes are actually octal numbers. You must give Ansible enough information to parse them correctly. For consistent results, quote octal numbers (for example, '644' or '1777') so Ansible receives a string and can do its own conversion from string into number. Adding a leading zero (for example, 0755) works sometimes, but can fail in loops and some other circumstances.
For those used to /usr/bin/chmod remember that modes are actually octal numbers. You must give Ansible enough information to parse them correctly. For consistent results, quote octal numbers (for example, '644' or '1777') so Ansible receives a string and can do its own conversion from string into number. Adding a leading zero (for example, 0755) works sometimes, but can fail in loops and some other circumstances.
Giving Ansible a number without following either of these rules will end up with a decimal number which will have unexpected results.
-As of Ansible 1.8, the mode may be specified as a symbolic mode (for example, u+rwx or u=rw,g=r,o=r).
If mode is not specified and the destination filesystem object does not exist, the default umask on the system will be used when setting the mode for the newly created filesystem object.
If mode is not specified and the destination filesystem object does exist, the mode of the existing filesystem object will be used.
Specifying mode is the best way to ensure filesystem objects are created with the correct permissions. See CVE-2020-1736 for further details.
As of Ansible 1.8, the mode may be specified as a symbolic mode (for example, u+rwx or u=rw,g=r,o=r).
If mode is not specified and the destination filesystem object does not exist, the default umask on the system will be used when setting the mode for the newly created filesystem object.
If mode is not specified and the destination filesystem object does exist, the mode of the existing filesystem object will be used.
Specifying mode is the best way to ensure filesystem objects are created with the correct permissions. See CVE-2020-1736 for further details.
The role part of the SELinux filesystem object context.
-When set to _default, it will use the role portion of the policy if available.
When set to _default, it will use the role portion of the policy if available.
The type part of the SELinux filesystem object context.
-When set to _default, it will use the type portion of the policy if available.
When set to _default, it will use the type portion of the policy if available.
The user part of the SELinux filesystem object context.
-By default it uses the system policy, where applicable.
When set to _default, it will use the user portion of the policy if available.
By default it uses the system policy, where applicable.
When set to _default, it will use the user portion of the policy if available.
The permissions the resulting filesystem object should have.
-For those used to /usr/bin/chmod remember that modes are actually octal numbers. You must give Ansible enough information to parse them correctly. For consistent results, quote octal numbers (for example, '644' or '1777') so Ansible receives a string and can do its own conversion from string into number. Adding a leading zero (for example, 0755) works sometimes, but can fail in loops and some other circumstances.
For those used to /usr/bin/chmod remember that modes are actually octal numbers. You must give Ansible enough information to parse them correctly. For consistent results, quote octal numbers (for example, '644' or '1777') so Ansible receives a string and can do its own conversion from string into number. Adding a leading zero (for example, 0755) works sometimes, but can fail in loops and some other circumstances.
Giving Ansible a number without following either of these rules will end up with a decimal number which will have unexpected results.
-As of Ansible 1.8, the mode may be specified as a symbolic mode (for example, u+rwx or u=rw,g=r,o=r).
If mode is not specified and the destination filesystem object does not exist, the default umask on the system will be used when setting the mode for the newly created filesystem object.
If mode is not specified and the destination filesystem object does exist, the mode of the existing filesystem object will be used.
Specifying mode is the best way to ensure filesystem objects are created with the correct permissions. See CVE-2020-1736 for further details.
As of Ansible 1.8, the mode may be specified as a symbolic mode (for example, u+rwx or u=rw,g=r,o=r).
If mode is not specified and the destination filesystem object does not exist, the default umask on the system will be used when setting the mode for the newly created filesystem object.
If mode is not specified and the destination filesystem object does exist, the mode of the existing filesystem object will be used.
Specifying mode is the best way to ensure filesystem objects are created with the correct permissions. See CVE-2020-1736 for further details.
The role part of the SELinux filesystem object context.
-When set to _default, it will use the role portion of the policy if available.
When set to _default, it will use the role portion of the policy if available.
The type part of the SELinux filesystem object context.
-When set to _default, it will use the type portion of the policy if available.
When set to _default, it will use the type portion of the policy if available.
The user part of the SELinux filesystem object context.
-By default it uses the system policy, where applicable.
When set to _default, it will use the user portion of the policy if available.
By default it uses the system policy, where applicable.
When set to _default, it will use the user portion of the policy if available.
The permissions the resulting filesystem object should have.
-For those used to /usr/bin/chmod remember that modes are actually octal numbers. You must give Ansible enough information to parse them correctly. For consistent results, quote octal numbers (for example, '644' or '1777') so Ansible receives a string and can do its own conversion from string into number. Adding a leading zero (for example, 0755) works sometimes, but can fail in loops and some other circumstances.
For those used to /usr/bin/chmod remember that modes are actually octal numbers. You must give Ansible enough information to parse them correctly. For consistent results, quote octal numbers (for example, '644' or '1777') so Ansible receives a string and can do its own conversion from string into number. Adding a leading zero (for example, 0755) works sometimes, but can fail in loops and some other circumstances.
Giving Ansible a number without following either of these rules will end up with a decimal number which will have unexpected results.
-As of Ansible 1.8, the mode may be specified as a symbolic mode (for example, u+rwx or u=rw,g=r,o=r).
If mode is not specified and the destination filesystem object does not exist, the default umask on the system will be used when setting the mode for the newly created filesystem object.
If mode is not specified and the destination filesystem object does exist, the mode of the existing filesystem object will be used.
Specifying mode is the best way to ensure filesystem objects are created with the correct permissions. See CVE-2020-1736 for further details.
As of Ansible 1.8, the mode may be specified as a symbolic mode (for example, u+rwx or u=rw,g=r,o=r).
If mode is not specified and the destination filesystem object does not exist, the default umask on the system will be used when setting the mode for the newly created filesystem object.
If mode is not specified and the destination filesystem object does exist, the mode of the existing filesystem object will be used.
Specifying mode is the best way to ensure filesystem objects are created with the correct permissions. See CVE-2020-1736 for further details.
The role part of the SELinux filesystem object context.
-When set to _default, it will use the role portion of the policy if available.
When set to _default, it will use the role portion of the policy if available.
The type part of the SELinux filesystem object context.
-When set to _default, it will use the type portion of the policy if available.
When set to _default, it will use the type portion of the policy if available.
The user part of the SELinux filesystem object context.
-By default it uses the system policy, where applicable.
When set to _default, it will use the user portion of the policy if available.
By default it uses the system policy, where applicable.
When set to _default, it will use the user portion of the policy if available.
The permissions the resulting filesystem object should have.
-For those used to /usr/bin/chmod remember that modes are actually octal numbers. You must give Ansible enough information to parse them correctly. For consistent results, quote octal numbers (for example, '644' or '1777') so Ansible receives a string and can do its own conversion from string into number. Adding a leading zero (for example, 0755) works sometimes, but can fail in loops and some other circumstances.
For those used to /usr/bin/chmod remember that modes are actually octal numbers. You must give Ansible enough information to parse them correctly. For consistent results, quote octal numbers (for example, '644' or '1777') so Ansible receives a string and can do its own conversion from string into number. Adding a leading zero (for example, 0755) works sometimes, but can fail in loops and some other circumstances.
Giving Ansible a number without following either of these rules will end up with a decimal number which will have unexpected results.
-As of Ansible 1.8, the mode may be specified as a symbolic mode (for example, u+rwx or u=rw,g=r,o=r).
If mode is not specified and the destination filesystem object does not exist, the default umask on the system will be used when setting the mode for the newly created filesystem object.
If mode is not specified and the destination filesystem object does exist, the mode of the existing filesystem object will be used.
Specifying mode is the best way to ensure filesystem objects are created with the correct permissions. See CVE-2020-1736 for further details.
As of Ansible 1.8, the mode may be specified as a symbolic mode (for example, u+rwx or u=rw,g=r,o=r).
If mode is not specified and the destination filesystem object does not exist, the default umask on the system will be used when setting the mode for the newly created filesystem object.
If mode is not specified and the destination filesystem object does exist, the mode of the existing filesystem object will be used.
Specifying mode is the best way to ensure filesystem objects are created with the correct permissions. See CVE-2020-1736 for further details.
The role part of the SELinux filesystem object context.
-When set to _default, it will use the role portion of the policy if available.
When set to _default, it will use the role portion of the policy if available.
The type part of the SELinux filesystem object context.
-When set to _default, it will use the type portion of the policy if available.
When set to _default, it will use the type portion of the policy if available.
The user part of the SELinux filesystem object context.
-By default it uses the system policy, where applicable.
When set to _default, it will use the user portion of the policy if available.
By default it uses the system policy, where applicable.
When set to _default, it will use the user portion of the policy if available.
The permissions the resulting filesystem object should have.
-For those used to /usr/bin/chmod remember that modes are actually octal numbers. You must give Ansible enough information to parse them correctly. For consistent results, quote octal numbers (for example, '644' or '1777') so Ansible receives a string and can do its own conversion from string into number. Adding a leading zero (for example, 0755) works sometimes, but can fail in loops and some other circumstances.
For those used to /usr/bin/chmod remember that modes are actually octal numbers. You must give Ansible enough information to parse them correctly. For consistent results, quote octal numbers (for example, '644' or '1777') so Ansible receives a string and can do its own conversion from string into number. Adding a leading zero (for example, 0755) works sometimes, but can fail in loops and some other circumstances.
Giving Ansible a number without following either of these rules will end up with a decimal number which will have unexpected results.
-As of Ansible 1.8, the mode may be specified as a symbolic mode (for example, u+rwx or u=rw,g=r,o=r).
If mode is not specified and the destination filesystem object does not exist, the default umask on the system will be used when setting the mode for the newly created filesystem object.
If mode is not specified and the destination filesystem object does exist, the mode of the existing filesystem object will be used.
Specifying mode is the best way to ensure filesystem objects are created with the correct permissions. See CVE-2020-1736 for further details.
As of Ansible 1.8, the mode may be specified as a symbolic mode (for example, u+rwx or u=rw,g=r,o=r).
If mode is not specified and the destination filesystem object does not exist, the default umask on the system will be used when setting the mode for the newly created filesystem object.
If mode is not specified and the destination filesystem object does exist, the mode of the existing filesystem object will be used.
Specifying mode is the best way to ensure filesystem objects are created with the correct permissions. See CVE-2020-1736 for further details.
The role part of the SELinux filesystem object context.
-When set to _default, it will use the role portion of the policy if available.
When set to _default, it will use the role portion of the policy if available.
The type part of the SELinux filesystem object context.
-When set to _default, it will use the type portion of the policy if available.
When set to _default, it will use the type portion of the policy if available.
The user part of the SELinux filesystem object context.
-By default it uses the system policy, where applicable.
When set to _default, it will use the user portion of the policy if available.
By default it uses the system policy, where applicable.
When set to _default, it will use the user portion of the policy if available.
any
The permissions the resulting filesystem object should have.
-For those used to /usr/bin/chmod remember that modes are actually octal numbers. You must give Ansible enough information to parse them correctly. For consistent results, quote octal numbers (for example, '644' or '1777') so Ansible receives a string and can do its own conversion from string into number. Adding a leading zero (for example, 0755) works sometimes, but can fail in loops and some other circumstances.
For those used to /usr/bin/chmod remember that modes are actually octal numbers. You must give Ansible enough information to parse them correctly. For consistent results, quote octal numbers (for example, '644' or '1777') so Ansible receives a string and can do its own conversion from string into number. Adding a leading zero (for example, 0755) works sometimes, but can fail in loops and some other circumstances.
Giving Ansible a number without following either of these rules will end up with a decimal number which will have unexpected results.
-As of Ansible 1.8, the mode may be specified as a symbolic mode (for example, u+rwx or u=rw,g=r,o=r).
If mode is not specified and the destination filesystem object does not exist, the default umask on the system will be used when setting the mode for the newly created filesystem object.
If mode is not specified and the destination filesystem object does exist, the mode of the existing filesystem object will be used.
Specifying mode is the best way to ensure filesystem objects are created with the correct permissions. See CVE-2020-1736 for further details.
As of Ansible 1.8, the mode may be specified as a symbolic mode (for example, u+rwx or u=rw,g=r,o=r).
If mode is not specified and the destination filesystem object does not exist, the default umask on the system will be used when setting the mode for the newly created filesystem object.
If mode is not specified and the destination filesystem object does exist, the mode of the existing filesystem object will be used.
Specifying mode is the best way to ensure filesystem objects are created with the correct permissions. See CVE-2020-1736 for further details.
The level part of the SELinux filesystem object context.
This is the MLS/MCS attribute, sometimes known as the range.
-When set to _default, it will use the level portion of the policy if available.
+When set to _default, it will use the level portion of the policy if available.
string
The role part of the SELinux filesystem object context.
-When set to _default, it will use the role portion of the policy if available.
When set to _default, it will use the role portion of the policy if available.
string
The type part of the SELinux filesystem object context.
-When set to _default, it will use the type portion of the policy if available.
When set to _default, it will use the type portion of the policy if available.
string
The user part of the SELinux filesystem object context.
-By default it uses the system policy, where applicable.
When set to _default, it will use the user portion of the policy if available.
By default it uses the system policy, where applicable.
When set to _default, it will use the user portion of the policy if available.
The permissions the resulting filesystem object should have.
-For those used to /usr/bin/chmod remember that modes are actually octal numbers. You must give Ansible enough information to parse them correctly. For consistent results, quote octal numbers (for example, '644' or '1777') so Ansible receives a string and can do its own conversion from string into number. Adding a leading zero (for example, 0755) works sometimes, but can fail in loops and some other circumstances.
For those used to /usr/bin/chmod remember that modes are actually octal numbers. You must give Ansible enough information to parse them correctly. For consistent results, quote octal numbers (for example, '644' or '1777') so Ansible receives a string and can do its own conversion from string into number. Adding a leading zero (for example, 0755) works sometimes, but can fail in loops and some other circumstances.
Giving Ansible a number without following either of these rules will end up with a decimal number which will have unexpected results.
-As of Ansible 1.8, the mode may be specified as a symbolic mode (for example, u+rwx or u=rw,g=r,o=r).
If mode is not specified and the destination filesystem object does not exist, the default umask on the system will be used when setting the mode for the newly created filesystem object.
If mode is not specified and the destination filesystem object does exist, the mode of the existing filesystem object will be used.
Specifying mode is the best way to ensure filesystem objects are created with the correct permissions. See CVE-2020-1736 for further details.
As of Ansible 1.8, the mode may be specified as a symbolic mode (for example, u+rwx or u=rw,g=r,o=r).
If mode is not specified and the destination filesystem object does not exist, the default umask on the system will be used when setting the mode for the newly created filesystem object.
If mode is not specified and the destination filesystem object does exist, the mode of the existing filesystem object will be used.
Specifying mode is the best way to ensure filesystem objects are created with the correct permissions. See CVE-2020-1736 for further details.
The role part of the SELinux filesystem object context.
-When set to _default, it will use the role portion of the policy if available.
When set to _default, it will use the role portion of the policy if available.
The type part of the SELinux filesystem object context.
-When set to _default, it will use the type portion of the policy if available.
When set to _default, it will use the type portion of the policy if available.
The user part of the SELinux filesystem object context.
-By default it uses the system policy, where applicable.
When set to _default, it will use the user portion of the policy if available.
By default it uses the system policy, where applicable.
When set to _default, it will use the user portion of the policy if available.
The level part of the SELinux filesystem object context.
This is the MLS/MCS attribute, sometimes known as the range.
When set to _default, it will use the level portion of the policy if available.
When set to _default, it will use the level portion of the policy if available.
The role part of the SELinux filesystem object context.
-When set to _default, it will use the role portion of the policy if available.
When set to _default, it will use the role portion of the policy if available.
The type part of the SELinux filesystem object context.
-When set to _default, it will use the type portion of the policy if available.
When set to _default, it will use the type portion of the policy if available.
The user part of the SELinux filesystem object context.
-By default it uses the system policy, where applicable.
When set to _default, it will use the user portion of the policy if available.
By default it uses the system policy, where applicable.
When set to _default, it will use the user portion of the policy if available.