* Fix M().

* Break long line.

* Fix the remaining M(...).

* Break long line.
This commit is contained in:
Felix Fontein
2020-06-29 14:59:15 +02:00
committed by GitHub
parent e3d36a3408
commit 097aebadb0
126 changed files with 155 additions and 198 deletions

View File

@@ -124,7 +124,7 @@ options:
the status changes to C(active) or C(disabled).
- Please note that there is a request limit. If you have to do multiple
updates, it can be better to disable waiting, and regularly use
M(hetzner_firewall_info) to query status.
M(community.general.hetzner_firewall_info) to query status.
type: bool
default: yes
wait_delay:

View File

@@ -40,7 +40,7 @@ options:
the status changes to C(active) or C(disabled).
- Please note that there is a request limit. If you have to do multiple
updates, it can be better to disable waiting, and regularly use
M(hetzner_firewall_info) to query status.
M(community.general.hetzner_firewall_info) to query status.
type: bool
default: yes
wait_delay:

View File

@@ -16,7 +16,7 @@ description:
- Add or remove LDAP attribute values.
notes:
- This only deals with attributes on existing entries. To add or remove
whole entries, see M(ldap_entry).
whole entries, see M(community.general.ldap_entry).
- The default authentication settings will attempt to use a SASL EXTERNAL
bind over a UNIX domain socket. This works well with the default Ubuntu
install for example, which includes a cn=peercred,cn=external,cn=auth ACL
@@ -35,7 +35,7 @@ notes:
deprecated:
removed_in: 3.0.0 # was Ansible 2.14
why: 'The current "ldap_attr" module does not support LDAP attribute insertions or deletions with objectClass dependencies.'
alternative: 'Use M(ldap_attrs) instead. Deprecated in community.general 0.2.0.'
alternative: 'Use M(community.general.ldap_attrs) instead. Deprecated in community.general 0.2.0.'
author:
- Jiri Tyr (@jtyr)
requirements:

View File

@@ -19,7 +19,7 @@ description:
- Add or remove multiple LDAP attribute values.
notes:
- This only deals with attributes on existing entries. To add or remove
whole entries, see M(ldap_entry).
whole entries, see M(community.general.ldap_entry).
- The default authentication settings will attempt to use a SASL EXTERNAL
bind over a UNIX domain socket. This works well with the default Ubuntu
install for example, which includes a cn=peercred,cn=external,cn=auth ACL

View File

@@ -17,7 +17,7 @@ short_description: Add or remove LDAP entries.
description:
- Add or remove LDAP entries. This module only asserts the existence or
non-existence of an LDAP entry, not its attributes. To assert the
attribute values of an entry, see M(ldap_attr).
attribute values of an entry, see M(community.general.ldap_attr).
notes:
- The default authentication settings will attempt to use a SASL EXTERNAL
bind over a UNIX domain socket. This works well with the default Ubuntu
@@ -37,7 +37,7 @@ options:
description:
- If I(state=present), attributes necessary to create an entry. Existing
entries are never modified. To assert specific attribute values on an
existing entry, use M(ldap_attr) module instead.
existing entry, use M(community.general.ldap_attr) module instead.
objectClass:
description:
- If I(state=present), value or list of values to use when creating

View File

@@ -15,7 +15,7 @@ short_description: Set passwords in LDAP.
description:
- Set a password for an LDAP entry. This module only asserts that
a given password is valid for a given entry. To assert the
existence of an entry, see M(ldap_entry).
existence of an entry, see M(community.general.ldap_entry).
notes:
- The default authentication settings will attempt to use a SASL EXTERNAL
bind over a UNIX domain socket. This works well with the default Ubuntu