mirror of
https://github.com/ansible-collections/community.routeros.git
synced 2025-06-21 09:35:45 +02:00
Use semantic markup (#185)
* Enable semantic markup. * Use semantic markup. * Break long lines. * Add ignore entries. * Ignore docs build error.
This commit is contained in:
parent
08c8c7ecc8
commit
2e78a207e9
17 changed files with 146 additions and 129 deletions
|
@ -43,48 +43,48 @@ options:
|
|||
- ssl
|
||||
port:
|
||||
description:
|
||||
- RouterOS api port. If I(tls) is set, port will apply to TLS/SSL connection.
|
||||
- Defaults are C(8728) for the HTTP API, and C(8729) for the HTTPS API.
|
||||
- RouterOS api port. If O(tls) is set, port will apply to TLS/SSL connection.
|
||||
- Defaults are V(8728) for the HTTP API, and V(8729) for the HTTPS API.
|
||||
type: int
|
||||
force_no_cert:
|
||||
description:
|
||||
- Set to C(true) to connect without a certificate when I(tls=true).
|
||||
- See also I(validate_certs).
|
||||
- Set to V(true) to connect without a certificate when O(tls=true).
|
||||
- See also O(validate_certs).
|
||||
- B(Note:) this forces the use of anonymous Diffie-Hellman (ADH) ciphers. The protocol is susceptible
|
||||
to Man-in-the-Middle attacks, because the keys used in the exchange are not authenticated.
|
||||
Instead of simply connecting without a certificate to "make things work" have a look at
|
||||
I(validate_certs) and I(ca_path).
|
||||
O(validate_certs) and O(ca_path).
|
||||
type: bool
|
||||
default: false
|
||||
version_added: 2.4.0
|
||||
validate_certs:
|
||||
description:
|
||||
- Set to C(false) to skip validation of TLS certificates.
|
||||
- See also I(validate_cert_hostname). Only used when I(tls=true).
|
||||
- Set to V(false) to skip validation of TLS certificates.
|
||||
- See also O(validate_cert_hostname). Only used when O(tls=true).
|
||||
- B(Note:) instead of simply deactivating certificate validations to "make things work",
|
||||
please consider creating your own CA certificate and using it to sign certificates used
|
||||
for your router. You can tell the module about your CA certificate with the I(ca_path)
|
||||
for your router. You can tell the module about your CA certificate with the O(ca_path)
|
||||
option.
|
||||
type: bool
|
||||
default: true
|
||||
version_added: 1.2.0
|
||||
validate_cert_hostname:
|
||||
description:
|
||||
- Set to C(true) to validate hostnames in certificates.
|
||||
- See also I(validate_certs). Only used when I(tls=true) and I(validate_certs=true).
|
||||
- Set to V(true) to validate hostnames in certificates.
|
||||
- See also O(validate_certs). Only used when O(tls=true) and O(validate_certs=true).
|
||||
type: bool
|
||||
default: false
|
||||
version_added: 1.2.0
|
||||
ca_path:
|
||||
description:
|
||||
- PEM formatted file that contains a CA certificate to be used for certificate validation.
|
||||
- See also I(validate_cert_hostname). Only used when I(tls=true) and I(validate_certs=true).
|
||||
- See also O(validate_cert_hostname). Only used when O(tls=true) and O(validate_certs=true).
|
||||
type: path
|
||||
version_added: 1.2.0
|
||||
encoding:
|
||||
description:
|
||||
- Use the specified encoding when communicating with the RouterOS device.
|
||||
- Default is C(ASCII). Note that C(UTF-8) requires librouteros 3.2.1 or newer.
|
||||
- Default is V(ASCII). Note that V(UTF-8) requires librouteros 3.2.1 or newer.
|
||||
type: str
|
||||
default: ASCII
|
||||
version_added: 2.1.0
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue