mirror of
https://github.com/ansible-collections/community.crypto.git
synced 2026-03-26 21:33:25 +00:00
Lint doc fragments.
This commit is contained in:
@@ -86,7 +86,8 @@ options:
|
|||||||
- Mutually exclusive with O(account_key_content).
|
- Mutually exclusive with O(account_key_content).
|
||||||
- Required if O(account_key_content) is not used.
|
- Required if O(account_key_content) is not used.
|
||||||
type: path
|
type: path
|
||||||
aliases: [account_key]
|
aliases:
|
||||||
|
- account_key
|
||||||
account_key_content:
|
account_key_content:
|
||||||
description:
|
description:
|
||||||
- Content of the ACME account RSA or Elliptic Curve key.
|
- Content of the ACME account RSA or Elliptic Curve key.
|
||||||
|
|||||||
@@ -372,7 +372,8 @@ options:
|
|||||||
- This is only used by the V(selfsigned) provider.
|
- This is only used by the V(selfsigned) provider.
|
||||||
type: str
|
type: str
|
||||||
default: +0s
|
default: +0s
|
||||||
aliases: [ selfsigned_notBefore ]
|
aliases:
|
||||||
|
- selfsigned_notBefore
|
||||||
|
|
||||||
selfsigned_not_after:
|
selfsigned_not_after:
|
||||||
description:
|
description:
|
||||||
@@ -390,7 +391,8 @@ options:
|
|||||||
Please see U(https://support.apple.com/en-us/HT210176) for more details.
|
Please see U(https://support.apple.com/en-us/HT210176) for more details.
|
||||||
type: str
|
type: str
|
||||||
default: +3650d
|
default: +3650d
|
||||||
aliases: [ selfsigned_notAfter ]
|
aliases:
|
||||||
|
- selfsigned_notAfter
|
||||||
|
|
||||||
selfsigned_create_subject_key_identifier:
|
selfsigned_create_subject_key_identifier:
|
||||||
description:
|
description:
|
||||||
|
|||||||
@@ -70,37 +70,51 @@ options:
|
|||||||
description:
|
description:
|
||||||
- The countryName field of the certificate signing request subject.
|
- The countryName field of the certificate signing request subject.
|
||||||
type: str
|
type: str
|
||||||
aliases: [C, countryName]
|
aliases:
|
||||||
|
- C
|
||||||
|
- countryName
|
||||||
state_or_province_name:
|
state_or_province_name:
|
||||||
description:
|
description:
|
||||||
- The stateOrProvinceName field of the certificate signing request subject.
|
- The stateOrProvinceName field of the certificate signing request subject.
|
||||||
type: str
|
type: str
|
||||||
aliases: [ST, stateOrProvinceName]
|
aliases:
|
||||||
|
- ST
|
||||||
|
- stateOrProvinceName
|
||||||
locality_name:
|
locality_name:
|
||||||
description:
|
description:
|
||||||
- The localityName field of the certificate signing request subject.
|
- The localityName field of the certificate signing request subject.
|
||||||
type: str
|
type: str
|
||||||
aliases: [L, localityName]
|
aliases:
|
||||||
|
- L
|
||||||
|
- localityName
|
||||||
organization_name:
|
organization_name:
|
||||||
description:
|
description:
|
||||||
- The organizationName field of the certificate signing request subject.
|
- The organizationName field of the certificate signing request subject.
|
||||||
type: str
|
type: str
|
||||||
aliases: [O, organizationName]
|
aliases:
|
||||||
|
- O
|
||||||
|
- organizationName
|
||||||
organizational_unit_name:
|
organizational_unit_name:
|
||||||
description:
|
description:
|
||||||
- The organizationalUnitName field of the certificate signing request subject.
|
- The organizationalUnitName field of the certificate signing request subject.
|
||||||
type: str
|
type: str
|
||||||
aliases: [OU, organizationalUnitName]
|
aliases:
|
||||||
|
- OU
|
||||||
|
- organizationalUnitName
|
||||||
common_name:
|
common_name:
|
||||||
description:
|
description:
|
||||||
- The commonName field of the certificate signing request subject.
|
- The commonName field of the certificate signing request subject.
|
||||||
type: str
|
type: str
|
||||||
aliases: [CN, commonName]
|
aliases:
|
||||||
|
- CN
|
||||||
|
- commonName
|
||||||
email_address:
|
email_address:
|
||||||
description:
|
description:
|
||||||
- The emailAddress field of the certificate signing request subject.
|
- The emailAddress field of the certificate signing request subject.
|
||||||
type: str
|
type: str
|
||||||
aliases: [E, emailAddress]
|
aliases:
|
||||||
|
- E
|
||||||
|
- emailAddress
|
||||||
subject_alt_name:
|
subject_alt_name:
|
||||||
description:
|
description:
|
||||||
- Subject Alternative Name (SAN) extension to attach to the certificate signing request.
|
- Subject Alternative Name (SAN) extension to attach to the certificate signing request.
|
||||||
@@ -111,63 +125,75 @@ options:
|
|||||||
- More at U(https://tools.ietf.org/html/rfc5280#section-4.2.1.6).
|
- More at U(https://tools.ietf.org/html/rfc5280#section-4.2.1.6).
|
||||||
type: list
|
type: list
|
||||||
elements: str
|
elements: str
|
||||||
aliases: [subjectAltName]
|
aliases:
|
||||||
|
- subjectAltName
|
||||||
subject_alt_name_critical:
|
subject_alt_name_critical:
|
||||||
description:
|
description:
|
||||||
- Should the subjectAltName extension be considered as critical.
|
- Should the subjectAltName extension be considered as critical.
|
||||||
type: bool
|
type: bool
|
||||||
default: false
|
default: false
|
||||||
aliases: [subjectAltName_critical]
|
aliases:
|
||||||
|
- subjectAltName_critical
|
||||||
use_common_name_for_san:
|
use_common_name_for_san:
|
||||||
description:
|
description:
|
||||||
- If set to V(true), the module will fill the common name in for O(subject_alt_name) with C(DNS:) prefix if no SAN is
|
- If set to V(true), the module will fill the common name in for O(subject_alt_name) with C(DNS:) prefix if no SAN is
|
||||||
specified.
|
specified.
|
||||||
type: bool
|
type: bool
|
||||||
default: true
|
default: true
|
||||||
aliases: [useCommonNameForSAN]
|
aliases:
|
||||||
|
- useCommonNameForSAN
|
||||||
key_usage:
|
key_usage:
|
||||||
description:
|
description:
|
||||||
- This defines the purpose (for example encipherment, signature, certificate signing) of the key contained in the certificate.
|
- This defines the purpose (for example encipherment, signature, certificate signing) of the key contained in the certificate.
|
||||||
type: list
|
type: list
|
||||||
elements: str
|
elements: str
|
||||||
aliases: [keyUsage]
|
aliases:
|
||||||
|
- keyUsage
|
||||||
key_usage_critical:
|
key_usage_critical:
|
||||||
description:
|
description:
|
||||||
- Should the keyUsage extension be considered as critical.
|
- Should the keyUsage extension be considered as critical.
|
||||||
type: bool
|
type: bool
|
||||||
default: false
|
default: false
|
||||||
aliases: [keyUsage_critical]
|
aliases:
|
||||||
|
- keyUsage_critical
|
||||||
extended_key_usage:
|
extended_key_usage:
|
||||||
description:
|
description:
|
||||||
- Additional restrictions (for example client authentication, server authentication) on the allowed purposes for which
|
- Additional restrictions (for example client authentication, server authentication) on the allowed purposes for which
|
||||||
the public key may be used.
|
the public key may be used.
|
||||||
type: list
|
type: list
|
||||||
elements: str
|
elements: str
|
||||||
aliases: [extKeyUsage, extendedKeyUsage]
|
aliases:
|
||||||
|
- extKeyUsage
|
||||||
|
- extendedKeyUsage
|
||||||
extended_key_usage_critical:
|
extended_key_usage_critical:
|
||||||
description:
|
description:
|
||||||
- Should the extkeyUsage extension be considered as critical.
|
- Should the extkeyUsage extension be considered as critical.
|
||||||
type: bool
|
type: bool
|
||||||
default: false
|
default: false
|
||||||
aliases: [extKeyUsage_critical, extendedKeyUsage_critical]
|
aliases:
|
||||||
|
- extKeyUsage_critical
|
||||||
|
- extendedKeyUsage_critical
|
||||||
basic_constraints:
|
basic_constraints:
|
||||||
description:
|
description:
|
||||||
- Indicates basic constraints, such as if the certificate is a CA.
|
- Indicates basic constraints, such as if the certificate is a CA.
|
||||||
type: list
|
type: list
|
||||||
elements: str
|
elements: str
|
||||||
aliases: [basicConstraints]
|
aliases:
|
||||||
|
- basicConstraints
|
||||||
basic_constraints_critical:
|
basic_constraints_critical:
|
||||||
description:
|
description:
|
||||||
- Should the basicConstraints extension be considered as critical.
|
- Should the basicConstraints extension be considered as critical.
|
||||||
type: bool
|
type: bool
|
||||||
default: false
|
default: false
|
||||||
aliases: [basicConstraints_critical]
|
aliases:
|
||||||
|
- basicConstraints_critical
|
||||||
ocsp_must_staple:
|
ocsp_must_staple:
|
||||||
description:
|
description:
|
||||||
- Indicates that the certificate should contain the OCSP Must Staple extension (U(https://tools.ietf.org/html/rfc7633)).
|
- Indicates that the certificate should contain the OCSP Must Staple extension (U(https://tools.ietf.org/html/rfc7633)).
|
||||||
type: bool
|
type: bool
|
||||||
default: false
|
default: false
|
||||||
aliases: [ocspMustStaple]
|
aliases:
|
||||||
|
- ocspMustStaple
|
||||||
ocsp_must_staple_critical:
|
ocsp_must_staple_critical:
|
||||||
description:
|
description:
|
||||||
- Should the OCSP Must Staple extension be considered as critical.
|
- Should the OCSP Must Staple extension be considered as critical.
|
||||||
@@ -175,7 +201,8 @@ options:
|
|||||||
OCSP Must Staple are required to reject such certificates (see U(https://tools.ietf.org/html/rfc7633#section-4)).
|
OCSP Must Staple are required to reject such certificates (see U(https://tools.ietf.org/html/rfc7633#section-4)).
|
||||||
type: bool
|
type: bool
|
||||||
default: false
|
default: false
|
||||||
aliases: [ocspMustStaple_critical]
|
aliases:
|
||||||
|
- ocspMustStaple_critical
|
||||||
name_constraints_permitted:
|
name_constraints_permitted:
|
||||||
description:
|
description:
|
||||||
- For CA certificates, this specifies a list of identifiers which describe subtrees of names that this CA is allowed
|
- For CA certificates, this specifies a list of identifiers which describe subtrees of names that this CA is allowed
|
||||||
|
|||||||
Reference in New Issue
Block a user