Skip to content
Snippets Groups Projects
Verified Commit 578b7819 authored by Evangelos Foutras's avatar Evangelos Foutras :smiley_cat:
Browse files

Capitalize the handler name in handler invocations

Fixes: 26f289b7 ("Capitalize the first letter of all task names")
parent 9558d275
No related branches found
No related tags found
No related merge requests found
Showing
with 27 additions and 27 deletions
......@@ -7,7 +7,7 @@
- {file: main.cf, group: root, mode: 644}
- {file: relay_passwords, group: postfix, mode: 640}
notify:
- reload postfix
- Reload postfix
- name: Create user account on mail to relay with
delegate_to: mail.archlinux.org
......
......@@ -4,7 +4,7 @@
- name: Install postfwd.cf
template: src=postfwd.cf.j2 dest=/etc/postfwd/postfwd.cf owner=postfwd group=root mode=0600
notify:
- reload postfwd
- Reload postfwd
- name: Start and enable postfwd
service: name=postfwd enabled=yes state=started
......@@ -26,7 +26,7 @@
chdir: /var/lib/postgres
creates: /var/lib/postgres/data/postgresql.conf
notify:
- restart postgres
- Restart postgres
- name: Configure postgres
template: src={{ item }}.j2 dest=/var/lib/postgres/data/{{ item }} owner=postgres group=postgres mode=0600
......@@ -34,7 +34,7 @@
- postgresql.conf
- pg_hba.conf
notify:
- restart postgres
- Restart postgres
- name: Install postgres certificate
copy: src=/etc/letsencrypt/live/{{ inventory_hostname }}/fullchain.pem dest={{ postgres_ssl_cert_file }}
......
......@@ -3,20 +3,20 @@
- name: Install prometheus configuration
template: src=prometheus.yml.j2 dest=/etc/prometheus/prometheus.yml owner=root group=prometheus mode=640
notify: reload prometheus
notify: Reload prometheus
- name: Install prometheus cli configuration
template: src=prometheus.conf.j2 dest=/etc/conf.d/prometheus owner=root group=root mode=600
notify: reload prometheus
notify: Reload prometheus
- name: Install prometheus web-config configuration
template: src=web-config.yml.j2 dest=/etc/prometheus/web-config.yml owner=root group=prometheus mode=640
notify: reload prometheus
notify: Reload prometheus
when: prometheus_receive_only
- name: Install prometheus alert configuration
copy: src=node.rules.yml dest=/etc/prometheus/node.rules.yml owner=root group=root mode=644
notify: reload prometheus
notify: Reload prometheus
when: not prometheus_receive_only
- name: Enable prometheus server service
......
......@@ -142,7 +142,7 @@
- name: Install blackbox exporter configuration
template: src=blackbox.yml.j2 dest=/etc/prometheus/blackbox.yml owner=root group=root mode=0644
notify: reload blackbox exporter
notify: Reload blackbox exporter
when: "'prometheus' in group_names"
- name: Install rebuilderd textcollector service
......
......@@ -3,7 +3,7 @@
- name: Install promtail configuration
template: src=promtail.yaml.j2 dest=/etc/loki/promtail.yaml owner=root group=promtail mode=0640
notify: restart promtail
notify: Restart promtail
- name: Open promtail ipv4 port for monitoring.archlinux.org
ansible.posix.firewalld: zone=wireguard state=enabled permanent=true immediate=yes
......@@ -16,7 +16,7 @@
- name: Install drop-in for promtail.service
copy: src=override.conf dest=/etc/systemd/system/promtail.service.d/ owner=root group=root mode=0644
notify: restart promtail
notify: Restart promtail
- name: Start and enable promtail
systemd: name=promtail.service enabled=yes daemon_reload=yes state=started
......@@ -28,5 +28,5 @@
- name: Set up nginx
template: src=nginx.d.conf.j2 dest=/etc/nginx/nginx.d/public_html.conf owner=root group=root mode=0644
notify:
- reload nginx
- Reload nginx
tags: ['nginx']
......@@ -46,7 +46,7 @@
- clean-quassel.timer
- clean-quassel.service
notify:
- daemon reload
- Daemon reload
- name: Add quassel.service.d dir
file: state=directory path=/etc/systemd/system/quassel.service.d owner=root group=root mode=0755
......
......@@ -19,7 +19,7 @@
- name: Set up nginx
template: src=nginx.d.conf.j2 dest=/etc/nginx/nginx.d/rebuilderd.conf owner=root group=root mode=0644
notify:
- reload nginx
- Reload nginx
tags: ['nginx']
- name: Enable and start rebuilderd
......
......@@ -23,7 +23,7 @@
- clean-repro.timer
- clean-repro.service
notify:
- daemon reload
- Daemon reload
- name: Start and enable cleanup timer
service: name=clean-repro.timer enabled=yes state=started
......@@ -11,7 +11,7 @@
- name: Set up nginx
template: src=nginx.d.conf.j2 dest="/etc/nginx/nginx.d/redirects.conf" owner=root group=root mode=644
notify: reload nginx
notify: Reload nginx
tags: ['nginx']
- name: Copy nginx map files
......
......@@ -4,12 +4,12 @@
- name: Install config
copy: src=local.d/ dest=/etc/rspamd/local.d/ owner=root group=root mode=0644
notify:
- reload rspamd
- Reload rspamd
- name: Install dkim_signing.conf
template: src=dkim_signing.conf.j2 dest=/etc/rspamd/local.d/dkim_signing.conf owner=root group=root mode=0644
notify:
- reload rspamd
- Reload rspamd
- name: Create rspamd dkim directory
file: path=/var/lib/rspamd/dkim state=directory owner=rspamd group=rspamd mode=0750
......@@ -31,7 +31,7 @@
- "{{ rspamd_dkim_domain }}.dkim-ed25519.key"
- "{{ rspamd_dkim_domain }}.dkim-rsa.key"
notify:
- reload rspamd
- Reload rspamd
- name: Start and enable rspamd
service: name=rspamd enabled=yes state=started
......@@ -47,7 +47,7 @@
- security-tracker-update.timer
- security-tracker-update.service
notify:
- daemon reload
- Daemon reload
- name: Disable security-tracker timer
service: name="security-tracker-update.timer" enabled=no state=stopped
......@@ -87,7 +87,7 @@
- name: Set up nginx
template: src=nginx.d.conf.j2 dest="{{ security_tracker_nginx_conf }}" owner=root group=root mode=644
notify:
- reload nginx
- Reload nginx
when: maintenance is not defined
tags: ['nginx']
......
......@@ -7,7 +7,7 @@
- name: Set up nginx
template: src=nginx.d.conf.j2 dest=/etc/nginx/nginx.d/sources.conf owner=root group=root mode=0644
notify:
- reload nginx
- Reload nginx
tags: ['nginx']
- name: Make nginx log dir
......
......@@ -4,7 +4,7 @@
- name: Configure sshd
template: src=sshd_config.j2 dest=/etc/ssh/sshd_config owner=root group=root mode=0644 validate='/usr/sbin/sshd -t -f %s'
notify:
- restart sshd
- Restart sshd
- name: Set file permissions
file: path=/etc/ssh mode=0600
......
......@@ -58,7 +58,7 @@
vars:
mirror_domains: "{{ [mirror_domain, geo_mirror_domain] if 'geo_mirrors' in group_names else [mirror_domain] }}"
notify:
- reload nginx
- Reload nginx
when: 'mirror_domain is defined'
tags: ['nginx']
......
......@@ -4,7 +4,7 @@
- name: Install unbound config file
template: src=unbound.conf.j2 dest=/etc/unbound/unbound.conf owner=root group=root mode=0644
notify:
- restart unbound
- Restart unbound
- name: Create remote-control keys
command: unbound-control-setup creates=/etc/unbound/unbound_control.key
......
......@@ -7,7 +7,7 @@
- name: Configure uwsgi
template: src=emperor.ini.j2 dest=/etc/uwsgi/emperor.ini owner=root group=root mode=0644
notify:
- restart emperor.uwsgi
- Restart emperor.uwsgi
- name: Vassals directory
file: state=directory path=/etc/uwsgi/vassals owner=root group=root mode=0755
......
......@@ -7,7 +7,7 @@
loop:
- {src: wg0.netdev.j2, dest: wg0.netdev}
- {src: wg0.network.j2, dest: wg0.network}
notify: reload wireguard
notify: Reload wireguard
- name: Create wireguard zone
ansible.posix.firewalld: zone=wireguard permanent=yes state=present
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment