Skip to content
Snippets Groups Projects
Verified Commit 578b7819 authored by Evangelos Foutras's avatar Evangelos Foutras :smiley_cat:
Browse files

Capitalize the handler name in handler invocations

Fixes: 26f289b7 ("Capitalize the first letter of all task names")
parent 9558d275
No related branches found
No related tags found
No related merge requests found
Showing
with 81 additions and 81 deletions
- name: Install dependencies
pacman: name=docker,python-docker,python-gitlab,gitlab-runner state=latest update_cache=yes
notify: restart gitlab-runner
notify: Restart gitlab-runner
- name: Install docker.slice
copy: src=docker.slice dest=/etc/systemd/system/ owner=root group=root mode=0644
notify: systemd daemon-reload
notify: Systemd daemon-reload
- name: Start docker
systemd: name=docker enabled=yes state=started daemon_reload=yes
- name: Configure Docker daemon for IPv6
copy: src=daemon.json dest=/etc/docker/daemon.json owner=root group=root mode=0644
notify: restart docker
notify: Restart docker
# We want to give our gitlab-runners full IPv6 capabilities. Sadly, IPv6 and Docker aren't friends. :(
# https://medium.com/@skleeschulte/how-to-enable-ipv6-for-docker-containers-on-ubuntu-18-04-c68394a219a2
......@@ -44,7 +44,7 @@
# Note: Secure runners must be added manually to the relevant projects
- name: Install runner configuration
template: src=config.toml.j2 dest=/etc/gitlab-runner/config.toml owner=root group=root mode=0600
notify: restart gitlab-runner
notify: Restart gitlab-runner
- name: Install gitlab-runner-docker-cleanup.{service,timer}
copy: src={{ item }} dest=/etc/systemd/system/{{ item }} owner=root group=root mode=0644
......@@ -52,7 +52,7 @@
- gitlab-runner-docker-cleanup.service
- gitlab-runner-docker-cleanup.timer
notify:
- restart gitlab-runner-docker-cleanup.timer
- Restart gitlab-runner-docker-cleanup.timer
- name: Enable and start gitlab-runner-docker-cleanup.timer
systemd: name=gitlab-runner-docker-cleanup.timer state=started enabled=yes daemon_reload=yes
......
......@@ -7,7 +7,7 @@
- gluebuddy.service
- gluebuddy.timer
notify:
- daemon reload
- Daemon reload
- name: Enable timer
systemd: name=gluebuddy.timer enabled=yes state=started
......
......@@ -10,7 +10,7 @@
- name: Set up nginx
template: src=nginx.d.conf.j2 dest=/etc/nginx/nginx.d/grafana.conf owner=root group=http mode=640
notify:
- reload nginx
- Reload nginx
tags: ['nginx']
- name: Make nginx log dir
......@@ -31,11 +31,11 @@
- name: Install grafana datasources provisioning
template: src=datasources.yaml.j2 dest=/etc/grafana/provisioning/datasources/prometheus.yml owner=grafana group=root mode=0600
notify: restart grafana
notify: Restart grafana
- name: Install grafana dashboard provisioning
template: src=dashboard.yaml.j2 dest=/etc/grafana/provisioning/dashboards/dasbhoard.yml owner=grafana group=root mode=0600
notify: restart grafana
notify: Restart grafana
- name: Copy grafana dashboards
copy: src=dashboards dest=/var/lib/grafana/dashboards owner=grafana group=grafana mode=0600
......@@ -46,7 +46,7 @@
- name: Install grafana config
template: src=grafana.ini.j2 dest=/etc/grafana.ini owner=grafana group=root mode=0600
notify: restart grafana
notify: Restart grafana
- name: Fix /var/lib/grafana permissions
file: path=/var/lib/grafana mode=0700 owner=grafana group=grafana
......
- name: Set restricted access to kernel logs
copy: src=50-dmesg-restrict.conf dest=/etc/sysctl.d/50-dmesg-restrict.conf owner=root group=root mode=0644
notify:
- apply sysctl settings
- Apply sysctl settings
- name: Set ptrace scope, restrict ptrace to CAP_SYS_PTRACE
copy: src=50-ptrace-restrict.conf dest=/etc/sysctl.d/50-ptrace-restrict.conf owner=root group=root mode=0644
when: "'buildservers' not in group_names"
notify:
- apply sysctl settings
- Apply sysctl settings
- name: Set restricted access to kernel pointers in proc fs
copy: src=50-kptr-restrict.conf dest=/etc/sysctl.d/50-kptr-restrict.conf owner=root group=root mode=0644
notify:
- apply sysctl settings
- Apply sysctl settings
- name: Enable JIT hardening for all users
copy: src=50-bpf_jit_harden.conf dest=/etc/sysctl.d/50-bpf_jit_harden.conf owner=root group=root mode=0644
notify:
- apply sysctl settings
- Apply sysctl settings
- name: Disable unprivileged bpf
copy: src=50-unprivileged_bpf_disabled.conf dest=/etc/sysctl.d/50-unprivileged_bpf_disabled.conf owner=root group=root mode=0644
notify:
- apply sysctl settings
- Apply sysctl settings
- name: Disable unprivileged userns
copy: src=50-unprivileged_userns_clone.conf dest=/etc/sysctl.d/50-unprivileged_userns_clone.conf owner=root group=root mode=0644
notify:
- apply sysctl settings
- Apply sysctl settings
- name: Disable kexec load
copy: src=50-kexec_load_disabled.conf dest=/etc/sysctl.d/50-kexec_load_disabled.conf owner=root group=root mode=0644
notify:
- apply sysctl settings
- Apply sysctl settings
- name: Set kernel lockdown to restricted
copy: src=50-lockdown.conf dest=/etc/tmpfiles.d/50-kernel-lockdown.conf owner=root group=root mode=0644
when: "'hcloud' in group_names"
notify:
- apply sysctl settings
- Apply sysctl settings
......@@ -24,7 +24,7 @@
- name: Set up nginx
template: src=nginx.d.conf.j2 dest={{ hedgedoc_nginx_conf }} owner=root group=http mode=640
notify: reload nginx
notify: Reload nginx
tags: ['nginx']
- name: Add hedgedoc.service.d dir
......
......@@ -18,7 +18,7 @@
template: src=keycloak.conf.j2 dest=/etc/keycloak/keycloak.conf owner=root group=keycloak mode=640
no_log: true
notify:
- restart keycloak
- Restart keycloak
- name: Create drop-in directory for keycloak.service
file: path=/etc/systemd/system/keycloak.service.d state=directory owner=root group=root mode=0755
......@@ -47,7 +47,7 @@
- name: Remove admin creation drop-in
file: path=/etc/systemd/system/keycloak.service.d/create-keycloak-admin.conf state=absent
notify:
- daemon reload
- Daemon reload
when: ansible_facts.services["keycloak.service"]["state"] != "running"
- name: Open firewall hole
......@@ -80,5 +80,5 @@
- name: Set up nginx
template: src=nginx.d.conf.j2 dest=/etc/nginx/nginx.d/keycloak.conf owner=root group=root mode=0644
notify:
- reload nginx
- Reload nginx
tags: ['nginx']
......@@ -3,14 +3,14 @@
- name: Install loki configuration
copy: src=loki.yaml dest=/etc/loki/ owner=root group=root mode=0644
notify: restart loki
notify: Restart loki
- name: Make nginx log dir
file: path=/var/log/nginx/loki state=directory owner=root group=root mode=0755
- name: Set up nginx
template: src=nginx.d.conf.j2 dest="/etc/nginx/nginx.d/logging.conf" owner=root group=root mode=640
notify: reload nginx
notify: Reload nginx
tags: ['nginx']
- name: Open firewall hole
......
......@@ -9,24 +9,24 @@
- name: Install mailman configuration
template: src=mm_cfg.py.j2 dest=/etc/mailman/mm_cfg.py follow=yes owner=root group=root mode=0644
notify: reload mailman
notify: Reload mailman
- name: Install postfix configuration
template: src=main.cf.j2 dest=/etc/postfix/main.cf owner=root group=root mode=0644
notify: reload postfix
notify: Reload postfix
- name: Install postfix maps
copy: src={{ item }} dest=/etc/postfix/ owner=root group=root mode=0644
loop:
- aliases
- milter_header_checks
notify: run postmap
notify: Run postmap
- name: Install postfix templated maps
template: src={{ item }}.j2 dest=/etc/postfix/{{ item }} owner=root group=root mode=0644
loop:
- transport
notify: run postmap
notify: Run postmap
- name: Open firewall holes for postfix
ansible.posix.firewalld: service=smtp zone={{ item }} permanent=true state=enabled immediate=yes
......@@ -50,11 +50,11 @@
- name: Install nginx mailman2->mailman3 redirect map
copy: src=migrated-lists.map dest=/etc/nginx/maps/ owner=root group=root mode=0644
notify: reload nginx
notify: Reload nginx
- name: Set up nginx
template: src=nginx.d.conf.j2 dest="/etc/nginx/nginx.d/mailman.conf" owner=root group=root mode=644
notify: reload nginx
notify: Reload nginx
tags: ['nginx']
- name: Start and enable postfix
......@@ -65,7 +65,7 @@
- name: Install drop-in for mailman.service
copy: src=override.conf dest=/etc/systemd/system/mailman.service.d/ owner=root group=root mode=0644
notify: restart mailman
notify: Restart mailman
- name: Start and enable mailman{.service,-*.timer}
systemd: name={{ item }} enabled=yes daemon_reload=yes state=started
......
......@@ -10,19 +10,19 @@
- {src: settings.py.j2, dest: /etc/webapps/mailman-web/settings.py, group: mailman-web}
- {src: urls.py.j2, dest: /etc/webapps/mailman-web/urls.py, group: mailman-web}
notify:
- reload mailman
- restart mailman-web
- Reload mailman
- Restart mailman-web
- name: Install mailman postfix.cfg configuration
copy: src=postfix.cfg dest=/etc/postfix.cfg owner=root group=root mode=0644
notify: reload mailman
notify: Reload mailman
- name: Make nginx log dir
file: path=/var/log/nginx/{{ lists_domain }} state=directory owner=root group=root mode=0755
- name: Set up nginx
template: src=nginx.d.conf.j2 dest="/etc/nginx/nginx.d/mailman.conf" owner=root group=root mode=644
notify: reload nginx
notify: Reload nginx
tags: ['nginx']
- name: Create postgres {mailman,mailman-web} user
......
......@@ -15,7 +15,7 @@
owner: root
group: root
mode: 0644
notify: reload nginx
notify: Reload nginx
when: service_nginx_template is not defined and maintenance is defined and maintenance|bool
- name: Set up custom nginx maintenance mode
......@@ -25,7 +25,7 @@
owner: root
group: root
mode: 0644
notify: reload nginx
notify: Reload nginx
when: service_nginx_template is defined and maintenance is defined and maintenance|bool
- name: Create the 503 html file
......
......@@ -9,7 +9,7 @@
- name: Configure mariadb
template: src=server.cnf.j2 dest=/etc/my.cnf.d/server.cnf owner=root group=root mode=0644
notify:
- restart mariadb
- Restart mariadb
- name: Start and enable the service
service: name=mariadb state=started enabled=yes
......
......@@ -84,7 +84,7 @@
become_method: sudo
register: synapse_pip
notify:
- restart synapse
- Restart synapse
- name: Install pantalaimon
pip:
......@@ -97,7 +97,7 @@
become_user: synapse
become_method: sudo
notify:
- restart pantalaimon
- Restart pantalaimon
- name: Download mjolnir
git:
......@@ -110,7 +110,7 @@
become_method: sudo
register: mjolnir_git
notify:
- restart mjolnir
- Restart mjolnir
- name: Install mjolnir
community.general.yarn:
......@@ -140,7 +140,7 @@
become_method: sudo
when: synapse_pip.changed or mjolnir_git.changed
notify:
- restart synapse
- Restart synapse
- name: Download matrix-appservice-irc
git:
......@@ -153,7 +153,7 @@
become_method: sudo
register: irc_git
notify:
- restart matrix-appservice-irc
- Restart matrix-appservice-irc
- name: Install matrix-appservice-irc
community.general.npm:
......@@ -167,7 +167,7 @@
- name: Install pg_hba.conf
copy: src=pg_hba.conf dest=/var/lib/postgres/data/pg_hba.conf owner=postgres group=postgres mode=0600
notify:
- restart postgres
- Restart postgres
- name: Add synapse postgres db
postgresql_db: db=synapse lc_collate=C lc_ctype=C template=template0
......@@ -196,7 +196,7 @@
- name: Install homeserver config
template: src=homeserver.yaml.j2 dest=/etc/synapse/homeserver.yaml owner=root group=synapse mode=0640
notify:
- restart synapse
- Restart synapse
- name: Install static config
copy: src={{ item }} dest=/etc/synapse/{{ item }} owner=root group=root mode=0644
......@@ -207,27 +207,27 @@
- worker-federation_sender.yaml
- worker-media_repository.yaml
notify:
- restart synapse
- Restart synapse
- name: Install pantalaimon config
template: src=pantalaimon.conf.j2 dest=/etc/synapse/pantalaimon.conf owner=root group=synapse mode=0644
notify:
- restart pantalaimon
- Restart pantalaimon
- name: Install mjolnir config
template: src=mjolnir.yaml.j2 dest=/etc/synapse/mjolnir/production.yaml owner=root group=synapse mode=0640
notify:
- restart mjolnir
- Restart mjolnir
- name: Install irc-bridge config
template: src=irc-bridge.yaml.j2 dest=/etc/synapse/irc-bridge.yaml owner=root group=synapse mode=0640
notify:
- restart matrix-appservice-irc
- Restart matrix-appservice-irc
- name: Install irc-bridge registration
template: src=appservice-registration-irc.yaml.j2 dest=/etc/synapse/appservice-registration-irc.yaml owner=root group=synapse mode=0640
notify:
- restart synapse
- Restart synapse
- name: Install signing key
copy:
......@@ -251,14 +251,14 @@
- name: Set up nginx
template: src=nginx.d.conf.j2 dest=/etc/nginx/nginx.d/matrix.conf owner=root group=root mode=0640
notify:
- reload nginx
- Reload nginx
when: 'matrix_domain is defined'
tags: ['nginx']
- name: Install turnserver.conf
template: src=turnserver.conf.j2 dest=/etc/turnserver/turnserver.conf owner=turnserver group=turnserver mode=0600
notify:
- restart turnserver
- Restart turnserver
- name: Install turnserver cert renewal hook
copy: src=letsencrypt.hook.d dest=/etc/letsencrypt/hook.d/turnserver owner=root group=root mode=0755
......@@ -269,28 +269,28 @@
- synapse.service
- synapse-worker@.service
notify:
- restart synapse
- Restart synapse
- name: Install pantalaimon units
copy: src={{ item }} dest=/etc/systemd/system/{{ item }} owner=root group=root mode=0644
with_items:
- pantalaimon.service
notify:
- restart pantalaimon
- Restart pantalaimon
- name: Install mjolnir units
copy: src={{ item }} dest=/etc/systemd/system/{{ item }} owner=root group=root mode=0644
with_items:
- mjolnir.service
notify:
- restart mjolnir
- Restart mjolnir
- name: Install matrix-appservice-irc units
copy: src={{ item }} dest=/etc/systemd/system/{{ item }} owner=root group=root mode=0644
with_items:
- matrix-appservice-irc.service
notify:
- restart matrix-appservice-irc
- Restart matrix-appservice-irc
- name: Enable synapse units
service: name={{ item }} enabled=yes
......@@ -301,35 +301,35 @@
- synapse-worker@federation_sender.service
- synapse-worker@media_repository.service
notify:
- restart synapse
- Restart synapse
- name: Enable pantalaimon units
service: name={{ item }} enabled=yes
with_items:
- pantalaimon.service
notify:
- restart pantalaimon
- Restart pantalaimon
- name: Enable mjolnir units
service: name={{ item }} enabled=yes
with_items:
- mjolnir.service
notify:
- restart mjolnir
- Restart mjolnir
- name: Enable matrix-appservice-irc units
service: name={{ item }} enabled=yes
with_items:
- matrix-appservice-irc.service
notify:
- restart matrix-appservice-irc
- Restart matrix-appservice-irc
- name: Enable turnserver units
service: name={{ item }} enabled=yes
with_items:
- turnserver.service
notify:
- restart turnserver
- Restart turnserver
- name: Open firewall holes
ansible.posix.firewalld: port={{ item }} permanent=true state=enabled immediate=yes
......
......@@ -11,5 +11,5 @@
- name: Set up nginx
template: src=nginx.d.conf.j2 dest="/etc/nginx/nginx.d/mta-sts.conf" owner=root group=root mode=644
notify: reload nginx
notify: Reload nginx
tags: ['nginx']
......@@ -3,7 +3,7 @@
- name: Install 10-static-ethernet.network
template: src=10-static-ethernet.network.j2 dest={{ chroot_path }}/etc/systemd/network/10-static-ethernet.network owner=root group=root mode=0644
notify:
- restart networkd
- Restart networkd
- name: Create drop-in directory for 10-static-ethernet.network
file: path={{ chroot_path }}/etc/systemd/network/10-static-ethernet.network.d state=directory owner=root group=root mode=0755
......@@ -11,7 +11,7 @@
- name: Configure static dns (static)
copy: src=dns.conf dest={{ chroot_path }}/etc/systemd/network/10-static-ethernet.network.d/dns.conf owner=root group=root mode=0644
notify:
- restart networkd
- Restart networkd
when: static_dns|default(true)
when: not dhcp|default(false)
......@@ -20,7 +20,7 @@
- name: Install 10-dhcp-ethernet.network
template: src=10-dhcp-ethernet.network.j2 dest={{ chroot_path }}/etc/systemd/network/10-dhcp-ethernet.network owner=root group=root mode=0644
notify:
- restart networkd
- Restart networkd
- name: Create drop-in directory for 10-dhcp-ethernet.network
file: path={{ chroot_path }}/etc/systemd/network/10-dhcp-ethernet.network.d state=directory owner=root group=root mode=0755
......@@ -28,7 +28,7 @@
- name: Configure static dns (dhcp)
copy: src=dns.conf dest={{ chroot_path }}/etc/systemd/network/10-dhcp-ethernet.network.d/dns.conf owner=root group=root mode=0644
notify:
- restart networkd
- Restart networkd
when: static_dns|default(false)
when: dhcp|default(false)
......
......@@ -7,7 +7,7 @@
- name: Configure nginx
template: src=nginx.conf.j2 dest=/etc/nginx/nginx.conf owner=root group=root mode=0644
notify:
- reload nginx
- Reload nginx
- name: Snippets directories
file: state=directory path=/etc/nginx/{{ item }} owner=root group=root mode=0755
......@@ -21,7 +21,7 @@
- letsencrypt.conf
- sslsettings.conf
notify:
- reload nginx
- Reload nginx
- name: Install cert renewal hook
template: src=letsencrypt.hook.d.j2 dest=/etc/letsencrypt/hook.d/nginx owner=root group=root mode=0755
......@@ -51,7 +51,7 @@
- name: Install inventory_hostname vhost
template: src=nginx-hostname-vhost.conf.j2 dest=/etc/nginx/nginx.d/nginx-hostname-vhost.conf owner=root group=root mode=0644
notify:
- reload nginx
- Reload nginx
tags: ['nginx']
- name: Enable nginx
......
......@@ -29,7 +29,7 @@
- name: Set up nginx
template: src=nginx.d.conf.j2 dest="{{ patchwork_nginx_conf }}" owner=root group=root mode=644
notify:
- reload nginx
- Reload nginx
when: maintenance is not defined
tags: ['nginx']
......@@ -111,17 +111,17 @@
- name: Install patchwork memcached service
template: src="patchwork-memcached.service.j2" dest="/etc/systemd/system/patchwork-memcached.service" owner=root group=root mode=0644
notify:
- daemon reload
- Daemon reload
- name: Install patchwork notification service
template: src="patchwork-notification.service.j2" dest="/etc/systemd/system/patchwork-notification.service" owner=root group=root mode=0644
notify:
- daemon reload
- Daemon reload
- name: Install patchwork notification timer
template: src="patchwork-notification.timer.j2" dest="/etc/systemd/system/patchwork-notification.timer" owner=root group=root mode=0644
notify:
- daemon reload
- Daemon reload
- name: Deploy patchwork
template: src=patchwork.ini.j2 dest=/etc/uwsgi/vassals/patchwork.ini owner=patchwork group=http mode=0644
......
......@@ -8,7 +8,7 @@
with_items:
- php-fpm7@.socket
- php-fpm7@.service
notify: daemon reload
notify: Daemon reload
- name: Configure default php.ini
template: >
......
......@@ -8,7 +8,7 @@
with_items:
- php-fpm@.socket
- php-fpm@.service
notify: daemon reload
notify: Daemon reload
- name: Configure default php.ini
template: >
......
......@@ -9,5 +9,5 @@
- name: Set up nginx
template: src=nginx.d.conf.j2 dest="/etc/nginx/nginx.d/ping.conf" owner=root group=root mode=644
notify: reload nginx
notify: Reload nginx
tags: ['nginx']
......@@ -11,9 +11,9 @@
- aliases
- users.pcre
notify:
- restart postfix
- postmap additional files
- update aliases db
- Restart postfix
- Postmap additional files
- Update aliases db
- name: Install additional files
copy: src={{ item }} dest=/etc/postfix/{{ item }} owner=root group=root mode=0644
......@@ -29,12 +29,12 @@
- domains
- msa_header_checks
notify:
- postmap additional files
- Postmap additional files
- name: Create dhparam 2048
command: openssl dhparam -out /etc/postfix/dh2048.pem 2048 creates=/etc/postfix/dh2048.pem
notify:
- reload postfix
- Reload postfix
- name: Create ssl cert
include_role:
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment