diff --git a/README-group.md b/README-group.md index 8bba32373e28ab3e79f12c0c2c1c5004785bb00f..0fb8a265698b67b488364973e469faae1be8d6ba 100644 --- a/README-group.md +++ b/README-group.md @@ -52,20 +52,20 @@ Example playbook to add groups: tasks: # Create group ops with gid 1234 - ipagroup: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: ops gidnumber: 1234 # Create group sysops - ipagroup: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: sysops user: - pinky # Create group appops - ipagroup: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: appops ``` @@ -80,7 +80,7 @@ Example playbook to add users to a group: tasks: # Add user member brain to group sysops - ipagroup: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: sysops action: member user: @@ -100,7 +100,7 @@ Example playbook to add group members to a group: tasks: # Add group members sysops and appops to group sysops - ipagroup: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: ops group: - sysops @@ -118,7 +118,7 @@ Example playbook to remove groups: tasks: # Remove goups sysops, appops and ops - ipagroup: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: sysops,appops,ops state: absent ``` diff --git a/README-hbacrule.md b/README-hbacrule.md index 39a242c1d52d9a5e539fdcb38bb994976fa892b1..d14692f9735cd95476122a0683b8b5a40b6338ed 100644 --- a/README-hbacrule.md +++ b/README-hbacrule.md @@ -50,7 +50,7 @@ Example playbook to make sure HBAC Rule login exists: tasks: # Ensure HBAC Rule login is present - ipahbacrule: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: login ``` @@ -66,7 +66,7 @@ Example playbook to make sure HBAC Rule login exists with the only HBAC Service tasks: # Ensure HBAC Rule login is present with the only HBAC Service sshd - ipahbacrule: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: login hbacsvc: - sshd @@ -83,7 +83,7 @@ Example playbook to make sure HBAC Service sshd is present in HBAC Rule login: tasks: # Ensure HBAC Service sshd is present in HBAC Rule login - ipahbacrule: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: login hbacsvc: - sshd @@ -101,7 +101,7 @@ Example playbook to make sure HBAC Service sshd is absent in HBAC Rule login: tasks: # Ensure HBAC Service sshd is present in HBAC Rule login - ipahbacrule: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: login hbacsvc: - sshd @@ -120,7 +120,7 @@ Example playbook to make sure HBAC Rule login is absent: tasks: # Ensure HBAC Rule login is present - ipahbacrule: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: login state: absent ``` diff --git a/README-hbacsvc.md b/README-hbacsvc.md index 861ed6f9856da27fa6dc0ca0319b93b40329fb96..7203e54971c47ddda82fa0b0258712fc1e2ded5e 100644 --- a/README-hbacsvc.md +++ b/README-hbacsvc.md @@ -50,7 +50,7 @@ Example playbook to make sure HBAC Service for http is present tasks: # Ensure HBAC Service for http is present - ipahbacsvc: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: http description: Web service ``` @@ -66,7 +66,7 @@ Example playbook to make sure HBAC Service for tftp is present tasks: # Ensure HBAC Service for tftp is present - ipahbacsvc: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: tftp description: TFTPWeb service ``` @@ -82,7 +82,7 @@ Example playbook to make sure HBAC Services for http and tftp are absent tasks: # Ensure HBAC Service for http and tftp are absent - ipahbacsvc: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: http,tftp state: absent ``` diff --git a/README-hbacsvcgroup.md b/README-hbacsvcgroup.md index 89dd02223b4efa4edd8ea80a6290901a1b0e8487..56d5f7a6880a6b55b7ea1659b1ea9a0f495a6560 100644 --- a/README-hbacsvcgroup.md +++ b/README-hbacsvcgroup.md @@ -50,7 +50,7 @@ Example playbook to make sure HBAC Service Group login exists: tasks: # Ensure HBAC Service Group login is present - ipahbacsvcgroup: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: login ``` @@ -66,7 +66,7 @@ Example playbook to make sure HBAC Service Group login exists with the only HBAC tasks: # Ensure HBAC Service Group login is present with the only HBAC Service sshd - ipahbacsvcgroup: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: login hbacsvc: - sshd @@ -83,7 +83,7 @@ Example playbook to make sure HBAC Service sshd is present in HBAC Service Group tasks: # Ensure HBAC Service sshd is present in HBAC Service Group login - ipahbacsvcgroup: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: login hbacsvc: - sshd @@ -101,7 +101,7 @@ Example playbook to make sure HBAC Service sshd is absent in HBAC Service Group tasks: # Ensure HBAC Service sshd is present in HBAC Service Group login - ipahbacsvcgroup: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: login hbacsvc: - sshd @@ -120,7 +120,7 @@ Example playbook to make sure HBAC Service Group login is absent: tasks: # Ensure HBAC Service Group login is present - ipahbacsvcgroup: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: login state: absent ``` diff --git a/README-host.md b/README-host.md index ecc59a9cfafd066ff7e248f002183541dea491fa..5f540cac10255ec7af0cce6c2b46496bb7a06b70 100644 --- a/README-host.md +++ b/README-host.md @@ -52,7 +52,7 @@ Example playbook to ensure host presence: tasks: # Ensure host is present - ipahost: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: host01.example.com description: Example host ip_address: 192.168.0.123 @@ -79,7 +79,7 @@ Example playbook to ensure host presence with several IP addresses: tasks: # Ensure host is present - ipahost: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: host01.example.com description: Example host ip_address: @@ -109,7 +109,7 @@ Example playbook to ensure IP addresses are present for a host: tasks: # Ensure host is present - ipahost: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: host01.example.com ip_address: - 192.168.0.124 @@ -130,7 +130,7 @@ Example playbook to ensure IP addresses are absent for a host: tasks: # Ensure host is present - ipahost: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: host01.example.com ip_address: - 192.168.0.124 @@ -151,7 +151,7 @@ Example playbook to ensure host presence without DNS: tasks: # Ensure host is present without DNS - ipahost: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: host02.example.com description: Example host force: yes @@ -169,7 +169,7 @@ Example playbook to ensure host presence with a random password: tasks: - name: Host host01.example.com present with random password ipahost: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: host01.example.com random: yes force: yes @@ -193,7 +193,7 @@ Example playbook to ensure presence of several hosts with a random password: tasks: - name: Hosts host01.example.com and host01.example.com present with random passwords ipahost: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword hosts: - name: host01.example.com random: yes @@ -225,7 +225,7 @@ Example playbook to ensure presence of host member principal: tasks: - name: Host host01.example.com present with principals host/testhost01.example.com and host/myhost01.example.com ipahost: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: host01.example.com principal: - host/testhost01.example.com @@ -244,7 +244,7 @@ Example playbook to ensure presence of host member certificate: tasks: - name: Host host01.example.com present with certificate ipahost: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: host01.example.com certificate: - MIIC/zCCAeegAwIBAg... @@ -262,7 +262,7 @@ Example playbook to ensure presence of member managedby_host for serveral hosts: tasks: ipahost: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword hosts: - name: host01.exmaple.com managedby_host: server.exmaple.com @@ -283,7 +283,7 @@ Example playbook to disable a host: tasks: # Ensure host is disabled - ipahost: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: host01.example.com update_dns: yes state: disabled diff --git a/README-hostgroup.md b/README-hostgroup.md index 39ea77f054e974d8dde8908a24b6bdcfe66a6043..857012443adb7ff7d9db7aa6e64187f76d4cac89 100644 --- a/README-hostgroup.md +++ b/README-hostgroup.md @@ -52,7 +52,7 @@ Example playbook to make sure hostgroup databases exists: tasks: # Ensure host-group databases is present - ipahostgroup: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: databases host: - db.example.com @@ -72,7 +72,7 @@ Example playbook to make sure that hosts and hostgroups are present in existing tasks: # Ensure hosts and hostgroups are present in existing databases hostgroup - ipahostgroup: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: databases host: - db.example.com @@ -94,7 +94,7 @@ Example playbook to make sure hosts and hostgroups are absent in databases hostg tasks: # Ensure hosts and hostgroups are absent in databases hostgroup - ipahostgroup: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: databases host: - db.example.com @@ -116,7 +116,7 @@ Example playbook to make sure host-group databases is absent: tasks: # Ensure host-group databases is absent - ipahostgroup: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: databases state: absent ``` diff --git a/README-pwpolicy.md b/README-pwpolicy.md index 847b32d3d950964e0736885302f99df07aa56e17..f0b5d8853d508301fb1fb343efcef8376e77001b 100644 --- a/README-pwpolicy.md +++ b/README-pwpolicy.md @@ -45,7 +45,7 @@ Example playbook to ensure presence of pwpolicies for exisiting group ops: tasks: - name: Ensure presence of pwpolicies for group ops ipapwpolicy: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: ops minlife: 7 maxlife: 49 @@ -67,7 +67,7 @@ Example playbook to ensure absence of pwpolicies for group ops: tasks: # Ensure absence of pwpolicies for group ops - ipapwpolicy: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: ops state: absent ``` @@ -83,7 +83,7 @@ Example playbook to ensure maxlife is set to 49 in global policy: tasks: # Ensure absence of pwpolicies for group ops - ipapwpolicy: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword maxlife: 49 ``` diff --git a/README-sudocmd.md b/README-sudocmd.md index 2842a2fc3ae38b8cd965e5b3c7bee3a7c8495021..64300e08d5b8484ae08649a333c313c11a6efd9c 100644 --- a/README-sudocmd.md +++ b/README-sudocmd.md @@ -52,7 +52,7 @@ Example playbook to make sure sudocmd exists: tasks: # Ensure sudocmd is present - ipasudocmd: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: /usr/bin/su state: present ``` @@ -68,7 +68,7 @@ Example playbook to make sure sudocmd is absent: tasks: # Ensure sudocmd are absent - ipahostgroup: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: /usr/bin/su state: absent ``` diff --git a/README-sudocmdgroup.md b/README-sudocmdgroup.md index f24b2cc4ee7bfcd7ec7ac8e53a6b632b18d9f25a..cca08c191d92e18b9fdf6ee610a4b734aec44d1a 100644 --- a/README-sudocmdgroup.md +++ b/README-sudocmdgroup.md @@ -52,7 +52,7 @@ Example playbook to make sure sudocmdgroup is present: tasks: # Ensure sudocmdgroup is present - ipasudocmdgroup: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: group01 description: Group of important commands ``` @@ -68,7 +68,7 @@ Example playbook to make sure that a sudo command and sudocmdgroups are present tasks: # Ensure sudo commands are present in existing sudocmdgroup - ipasudocmdgroup: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: group01 sudocmd: - /usr/bin/su @@ -88,7 +88,7 @@ Example playbook to make sure that a sudo command and sudocmdgroups are absent i tasks: # Ensure sudocmds are absent in existing sudocmdgroup - ipasudocmdgroup: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: group01 sudocmd: - /usr/bin/su @@ -108,7 +108,7 @@ Example playbook to make sure sudocmdgroup is absent: tasks: # Ensure sudocmdgroup is absent - ipasudocmdgroup: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: group01 state: absent ``` diff --git a/README-sudorule.md b/README-sudorule.md index 50c73ade9ce673e505b9355401490408c8be6135..ffcab9638f44516671779ebf8271d3c540ba0936 100644 --- a/README-sudorule.md +++ b/README-sudorule.md @@ -50,7 +50,7 @@ Example playbook to make sure Sudo Rule is present: tasks: # Ensure Sudo Rule is present - ipasudorule: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: testrule1 ``` @@ -66,7 +66,7 @@ Example playbook to make sure sudocmds are present in Sudo Rule: tasks: # Ensure Sudo Rule is present - ipasudorule: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: testrule1 allow_sudocmd: - /sbin/ifconfig @@ -85,7 +85,7 @@ Example playbook to make sure sudocmds are not present in Sudo Rule: tasks: # Ensure Sudo Rule is present - ipasudorule: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: testrule1 allow_sudocmd: - /sbin/ifconfig @@ -104,7 +104,7 @@ Example playbook to make sure Sudo Rule is absent: tasks: # Ensure Sudo Rule is present - ipasudorule: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: testrule1 state: absent ``` diff --git a/README-topology.md b/README-topology.md index dc595ebdb104116830762003898ca968802c4e5e..84ab240d50166f57a05494ffcb1b49ebddfaf477 100644 --- a/README-topology.md +++ b/README-topology.md @@ -50,7 +50,7 @@ Example playbook to add a topology segment with default name (cn): tasks: - name: Add topology segment ipatopologysegment: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword suffix: domain left: ipareplica1.test.local right: ipareplica2.test.local @@ -70,7 +70,7 @@ Example playbook to delete a topology segment: tasks: - name: Delete topology segment ipatopologysegment: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword suffix: domain left: ipareplica1.test.local right: ipareplica2.test.local @@ -90,7 +90,7 @@ Example playbook to reinitialize a topology segment: tasks: - name: Reinitialize topology segment ipatopologysegment: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword suffix: domain left: ipareplica1.test.local right: ipareplica2.test.local @@ -111,7 +111,7 @@ Example playbook to verify a topology suffix: tasks: - name: Verify topology suffix ipatopologysuffix: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword suffix: domain state: verified ``` diff --git a/README-user.md b/README-user.md index 991121c6f9885289bab0c7875c3e3ac4f00973ee..6958ebe575066d6ea6d1ea831f04adc8b0587864 100644 --- a/README-user.md +++ b/README-user.md @@ -52,7 +52,7 @@ Example playbook to ensure a user is present: tasks: # Ensure user pinky is present - ipauser: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: pinky first: pinky last: Acme @@ -66,7 +66,7 @@ Example playbook to ensure a user is present: # Ensure user brain is present - ipauser: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: brain first: brain last: Acme @@ -85,7 +85,7 @@ These two `ipauser` module calls can be combined into one with the `users` varia tasks: # Ensure users pinky and brain are present - ipauser: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword users: - name: pinky first: pinky @@ -153,7 +153,7 @@ Ensure user pinky is present with a generated random password and print the rand tasks: # Ensure user pinky is present with a random password - ipauser: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: brain first: brain last: Acme @@ -176,7 +176,7 @@ Ensure users pinky and brain are present with a generated random password and pr tasks: # Ensure users pinky and brain are present with random password - ipauser: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword users: - name: pinky first: pinky @@ -212,7 +212,7 @@ Example playbook to delete a user, but preserve it: tasks: # Remove but preserve user pinky - ipauser: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: pinky preserve: yes state: absent @@ -231,7 +231,7 @@ Example playbook to delete a user, but preserve it using the `users` variable: tasks: # Remove but preserve user pinky - ipauser: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword users: - name: pinky preserve: yes @@ -252,7 +252,7 @@ Example playbook to undelete a preserved user. tasks: # Undelete preserved user pinky - ipauser: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: pinky state: undeleted ``` @@ -271,7 +271,7 @@ Example playbook to disable a user: tasks: # Disable user pinky - ipauser: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: pinky state: disabled ``` @@ -290,7 +290,7 @@ Example playbook to enable users: tasks: # Enable user pinky and brain - ipauser: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: pinky,brain state: enabled ``` @@ -309,7 +309,7 @@ Example playbook to unlock users: tasks: # Unlock user pinky and brain - ipauser: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: pinky,brain state: unlocked ``` @@ -326,7 +326,7 @@ Example playbook to ensure users are absent: tasks: # Ensure users pinky and brain are absent - ipauser: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: pinky,brain state: absent ``` @@ -345,7 +345,7 @@ Example playbook to ensure users are absent: tasks: # Ensure users pinky and brain are absent - ipauser: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword users: - name: pinky - name: brain diff --git a/README-vault.md b/README-vault.md index 4be246961832b658c7d81a066fe81669fb5e8b78..9c0c833c4a9e5454cadcc778e2d8c6c5a84a0bd1 100644 --- a/README-vault.md +++ b/README-vault.md @@ -51,7 +51,7 @@ Example playbook to make sure vault is present: tasks: - ipavault: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: symvault username: admin vault_password: MyVaultPassword123 @@ -68,7 +68,7 @@ Example playbook to make sure that a vault and its members are present: tasks: - ipavault: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: symvault username: admin users: user01 @@ -86,7 +86,7 @@ Example playbook to make sure that a vault member is present in vault: tasks: - ipavault: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: symvault username: admin users: user01 @@ -103,7 +103,7 @@ Example playbook to make sure that a vault owner is absent in vault: tasks: - ipavault: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: symvault username: admin owner: user01 @@ -121,7 +121,7 @@ Example playbook to make sure vault data is present in a symmetric vault: tasks: - ipavault: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: symvault username: admin vault_password: MyVaultPassword123 @@ -141,7 +141,7 @@ Example playbook to make sure vault data is absent in a symmetric vault: tasks: - ipavault: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: symvault username: admin vault_password: MyVaultPassword123 @@ -159,7 +159,7 @@ Example playbook to make sure vault is absent: tasks: - ipavault: - ipaadmin_password: MyPassword123 + ipaadmin_password: SomeADMINpassword name: symvault username: admin state: absent