Skip to content
Snippets Groups Projects
Verified Commit 578b7819 authored by Evangelos Foutras's avatar Evangelos Foutras :smiley_cat:
Browse files

Capitalize the handler name in handler invocations

Fixes: 26f289b7 ("Capitalize the first letter of all task names")
parent 9558d275
No related branches found
No related tags found
No related merge requests found
Showing
with 53 additions and 53 deletions
...@@ -39,7 +39,7 @@ as a variable, to make sure the right file is used. ...@@ -39,7 +39,7 @@ as a variable, to make sure the right file is used.
- name: set up nginx - name: set up nginx
template: src=nginx.d.conf.j2 dest="{{ service_nginx_conf }}" owner=root group=root mode=644 template: src=nginx.d.conf.j2 dest="{{ service_nginx_conf }}" owner=root group=root mode=644
notify: notify:
- reload nginx - Reload nginx
when: maintenance is not defined when: maintenance is not defined
tags: ['nginx'] tags: ['nginx']
``` ```
......
...@@ -6,7 +6,7 @@ ...@@ -6,7 +6,7 @@
loop: loop:
- {src: pdns.conf.j2, dest: pdns.conf} - {src: pdns.conf.j2, dest: pdns.conf}
- {src: dnsupdate-policy.lua.j2, dest: dnsupdate-policy.lua} - {src: dnsupdate-policy.lua.j2, dest: dnsupdate-policy.lua}
notify: restart powerdns notify: Restart powerdns
- name: Create directory for sqlite3 dbs - name: Create directory for sqlite3 dbs
file: path=/var/lib/powerdns state=directory owner=powerdns group=powerdns mode=0755 file: path=/var/lib/powerdns state=directory owner=powerdns group=powerdns mode=0755
......
...@@ -3,7 +3,7 @@ ...@@ -3,7 +3,7 @@
- name: Install alertmanager configuration - name: Install alertmanager configuration
template: src=alertmanager.yml.j2 dest=/etc/alertmanager/alertmanager.yml owner=root group=alertmanager mode=640 template: src=alertmanager.yml.j2 dest=/etc/alertmanager/alertmanager.yml owner=root group=alertmanager mode=640
notify: reload alertmanager notify: Reload alertmanager
- name: Enable alertmanager server service - name: Enable alertmanager server service
systemd: name=alertmanager enabled=yes daemon_reload=yes state=started systemd: name=alertmanager enabled=yes daemon_reload=yes state=started
...@@ -10,7 +10,7 @@ ...@@ -10,7 +10,7 @@
- arch-boxes-sync.service - arch-boxes-sync.service
- arch-boxes-sync.timer - arch-boxes-sync.timer
notify: notify:
- daemon reload - Daemon reload
- name: Start and enable arch-boxes-sync.timer - name: Start and enable arch-boxes-sync.timer
systemd: name=arch-boxes-sync.timer enabled=yes daemon_reload=yes state=started systemd: name=arch-boxes-sync.timer enabled=yes daemon_reload=yes state=started
...@@ -45,14 +45,14 @@ ...@@ -45,14 +45,14 @@
- var-lib-archbuilddest.mount - var-lib-archbuilddest.mount
- strictatime@.service - strictatime@.service
notify: notify:
- daemon reload - Daemon reload
- name: Install archbuild unit - name: Install archbuild unit
copy: src={{ item }} dest=/etc/systemd/system/{{ item }} owner=root group=root mode=0644 copy: src={{ item }} dest=/etc/systemd/system/{{ item }} owner=root group=root mode=0644
with_items: with_items:
- var-lib-archbuild.mount - var-lib-archbuild.mount
notify: notify:
- daemon reload - Daemon reload
- name: Install archbuild user units - name: Install archbuild user units
copy: src={{ item }} dest=/etc/systemd/user/{{ item }} owner=root group=root mode=0644 copy: src={{ item }} dest=/etc/systemd/user/{{ item }} owner=root group=root mode=0644
......
...@@ -12,7 +12,7 @@ ...@@ -12,7 +12,7 @@
group: root group: root
mode: 0644 mode: 0644
notify: notify:
- reload nginx - Reload nginx
tags: ['nginx'] tags: ['nginx']
- name: Make nginx log dir - name: Make nginx log dir
......
...@@ -33,7 +33,7 @@ ...@@ -33,7 +33,7 @@
- name: Set up nginx - name: Set up nginx
template: src=nginx.d.conf.j2 dest="{{ archmanweb_nginx_conf }}" owner=root group=root mode=644 template: src=nginx.d.conf.j2 dest="{{ archmanweb_nginx_conf }}" owner=root group=root mode=644
notify: reload nginx notify: Reload nginx
tags: ['nginx'] tags: ['nginx']
- name: Make nginx log dir - name: Make nginx log dir
......
...@@ -31,7 +31,7 @@ ...@@ -31,7 +31,7 @@
- name: Set up nginx - name: Set up nginx
template: src=nginx.d.conf.j2 dest="{{ archweb_nginx_conf }}" owner=root group=root mode=644 template: src=nginx.d.conf.j2 dest="{{ archweb_nginx_conf }}" owner=root group=root mode=644
notify: reload nginx notify: Reload nginx
when: archweb_site|bool and maintenance is not defined when: archweb_site|bool and maintenance is not defined
tags: ['nginx'] tags: ['nginx']
...@@ -139,13 +139,13 @@ ...@@ -139,13 +139,13 @@
- name: Install reporead service - name: Install reporead service
template: src="archweb-reporead.service.j2" dest="/etc/systemd/system/archweb-reporead.service" owner=root group=root mode=0644 template: src="archweb-reporead.service.j2" dest="/etc/systemd/system/archweb-reporead.service" owner=root group=root mode=0644
notify: notify:
- daemon reload - Daemon reload
when: archweb_services or archweb_reporead when: archweb_services or archweb_reporead
- name: Install readlinks service - name: Install readlinks service
template: src="archweb-readlinks.service.j2" dest="/etc/systemd/system/archweb-readlinks.service" owner=root group=root mode=0644 template: src="archweb-readlinks.service.j2" dest="/etc/systemd/system/archweb-readlinks.service" owner=root group=root mode=0644
notify: notify:
- daemon reload - Daemon reload
when: archweb_services or archweb_reporead when: archweb_services or archweb_reporead
- name: Install mirrorcheck service and timer - name: Install mirrorcheck service and timer
...@@ -154,7 +154,7 @@ ...@@ -154,7 +154,7 @@
- archweb-mirrorcheck.service - archweb-mirrorcheck.service
- archweb-mirrorcheck.timer - archweb-mirrorcheck.timer
notify: notify:
- daemon reload - Daemon reload
when: archweb_services or archweb_mirrorcheck when: archweb_services or archweb_mirrorcheck
- name: Install mirrorresolv service and timer - name: Install mirrorresolv service and timer
...@@ -163,7 +163,7 @@ ...@@ -163,7 +163,7 @@
- archweb-mirrorresolv.service - archweb-mirrorresolv.service
- archweb-mirrorresolv.timer - archweb-mirrorresolv.timer
notify: notify:
- daemon reload - Daemon reload
when: archweb_services or archweb_mirrorresolv when: archweb_services or archweb_mirrorresolv
- name: Install populate_signoffs service and timer - name: Install populate_signoffs service and timer
...@@ -172,7 +172,7 @@ ...@@ -172,7 +172,7 @@
- archweb-populate_signoffs.service - archweb-populate_signoffs.service
- archweb-populate_signoffs.timer - archweb-populate_signoffs.timer
notify: notify:
- daemon reload - Daemon reload
when: archweb_services or archweb_populate_signoffs when: archweb_services or archweb_populate_signoffs
- name: Install planet service and timer - name: Install planet service and timer
...@@ -181,7 +181,7 @@ ...@@ -181,7 +181,7 @@
- archweb-planet.service - archweb-planet.service
- archweb-planet.timer - archweb-planet.timer
notify: notify:
- daemon reload - Daemon reload
when: archweb_planet when: archweb_planet
- name: Install rebuilderd status service and timer - name: Install rebuilderd status service and timer
...@@ -190,13 +190,13 @@ ...@@ -190,13 +190,13 @@
- archweb-rebuilderd.service - archweb-rebuilderd.service
- archweb-rebuilderd.timer - archweb-rebuilderd.timer
notify: notify:
- daemon reload - Daemon reload
when: archweb_site when: archweb_site
- name: Install pgp_import service - name: Install pgp_import service
template: src="archweb-pgp_import.service.j2" dest="/etc/systemd/system/archweb-pgp_import.service" owner=root group=root mode=0644 template: src="archweb-pgp_import.service.j2" dest="/etc/systemd/system/archweb-pgp_import.service" owner=root group=root mode=0644
notify: notify:
- daemon reload - Daemon reload
when: archweb_services or archweb_pgp_import when: archweb_services or archweb_pgp_import
- name: Create pacman.d hooks dir - name: Create pacman.d hooks dir
...@@ -210,7 +210,7 @@ ...@@ -210,7 +210,7 @@
- name: Install archweb memcached service - name: Install archweb memcached service
template: src="archweb-memcached.service.j2" dest="/etc/systemd/system/archweb-memcached.service" owner=root group=root mode=0644 template: src="archweb-memcached.service.j2" dest="/etc/systemd/system/archweb-memcached.service" owner=root group=root mode=0644
notify: notify:
- daemon reload - Daemon reload
when: archweb_site|bool when: archweb_site|bool
- name: Install archweb rsync iso service and timer - name: Install archweb rsync iso service and timer
...@@ -219,7 +219,7 @@ ...@@ -219,7 +219,7 @@
- archweb-rsync_iso.service - archweb-rsync_iso.service
- archweb-rsync_iso.timer - archweb-rsync_iso.timer
notify: notify:
- daemon reload - Daemon reload
when: archweb_site|bool when: archweb_site|bool
- name: Deploy archweb - name: Deploy archweb
...@@ -229,7 +229,7 @@ ...@@ -229,7 +229,7 @@
- name: Deploy new release - name: Deploy new release
file: path=/etc/uwsgi/vassals/archweb.ini state=touch owner=archweb group=http mode=0640 file: path=/etc/uwsgi/vassals/archweb.ini state=touch owner=archweb group=http mode=0640
when: archweb_site and (release.changed or config.changed or virtualenv.changed or archweb_forced_deploy) when: archweb_site and (release.changed or config.changed or virtualenv.changed or archweb_forced_deploy)
notify: restart archweb memcached notify: Restart archweb memcached
- name: Start and enable archweb memcached service and archweb-rsync_iso timer - name: Start and enable archweb memcached service and archweb-rsync_iso timer
systemd: systemd:
......
...@@ -37,7 +37,7 @@ ...@@ -37,7 +37,7 @@
- name: Set up nginx - name: Set up nginx
template: src=nginx.d.conf.j2 dest="{{ archwiki_nginx_conf }}" owner=root group=root mode=644 template: src=nginx.d.conf.j2 dest="{{ archwiki_nginx_conf }}" owner=root group=root mode=644
notify: notify:
- reload nginx - Reload nginx
when: maintenance is not defined when: maintenance is not defined
tags: ['nginx'] tags: ['nginx']
...@@ -55,11 +55,11 @@ ...@@ -55,11 +55,11 @@
become: true become: true
become_user: "{{ archwiki_user }}" become_user: "{{ archwiki_user }}"
notify: notify:
- run wiki updatescript - Run wiki updatescript
# purge the nginx cache and MediaWiki file cache to make sure clients get updated assets # purge the nginx cache and MediaWiki file cache to make sure clients get updated assets
# as well as freshly rendered pages using the new assets # as well as freshly rendered pages using the new assets
- purge nginx cache - Purge nginx cache
- invalidate MediaWiki file cache - Invalidate MediaWiki file cache
- name: Configure archwiki - name: Configure archwiki
template: src=LocalSettings.php.j2 dest="{{ archwiki_dir }}/public/LocalSettings.php" owner="{{ archwiki_user }}" group="{{ archwiki_user }}" mode=0640 template: src=LocalSettings.php.j2 dest="{{ archwiki_dir }}/public/LocalSettings.php" owner="{{ archwiki_user }}" group="{{ archwiki_user }}" mode=0640
...@@ -81,7 +81,7 @@ ...@@ -81,7 +81,7 @@
src=php-fpm.conf.j2 dest="/etc/php/php-fpm.d/{{ archwiki_user }}.conf" src=php-fpm.conf.j2 dest="/etc/php/php-fpm.d/{{ archwiki_user }}.conf"
owner=root group=root mode=0644 owner=root group=root mode=0644
notify: notify:
- restart php-fpm@{{ archwiki_user }} - Restart php-fpm@{{ archwiki_user }}
- name: Start and enable systemd socket - name: Start and enable systemd socket
service: name=php-fpm@{{ archwiki_user }}.socket state=started enabled=true service: name=php-fpm@{{ archwiki_user }}.socket state=started enabled=true
......
...@@ -221,7 +221,7 @@ ...@@ -221,7 +221,7 @@
- name: Set up nginx - name: Set up nginx
template: src=nginx.d.conf.j2 dest={{ aurweb_nginx_conf }} owner=root group=root mode=644 template: src=nginx.d.conf.j2 dest={{ aurweb_nginx_conf }} owner=root group=root mode=644
notify: reload nginx notify: Reload nginx
tags: ['nginx'] tags: ['nginx']
- name: Make nginx log dir - name: Make nginx log dir
...@@ -297,7 +297,7 @@ ...@@ -297,7 +297,7 @@
- name: Configure sshd - name: Configure sshd
template: src=aurweb_config.j2 dest={{ sshd_includes_dir }}/aurweb_config owner=root group=root mode=0600 validate='/usr/sbin/sshd -t -f %s' template: src=aurweb_config.j2 dest={{ sshd_includes_dir }}/aurweb_config owner=root group=root mode=0600 validate='/usr/sbin/sshd -t -f %s'
notify: notify:
- restart sshd - Restart sshd
- name: Start and enable AUR systemd services and timers - name: Start and enable AUR systemd services and timers
service: name={{ item }} enabled=yes state=started daemon_reload=yes service: name={{ item }} enabled=yes state=started daemon_reload=yes
......
...@@ -85,12 +85,12 @@ ...@@ -85,12 +85,12 @@
- name: Install journald.conf overrides - name: Install journald.conf overrides
template: src=journald.conf.j2 dest=/etc/systemd/journald.conf.d/override.conf owner=root group=root mode=644 template: src=journald.conf.j2 dest=/etc/systemd/journald.conf.d/override.conf owner=root group=root mode=644
notify: notify:
- restart journald - Restart journald
- name: Install system.conf overrides - name: Install system.conf overrides
template: src=system.conf.j2 dest=/etc/systemd/system.conf.d/override.conf owner=root group=root mode=0644 template: src=system.conf.j2 dest=/etc/systemd/system.conf.d/override.conf owner=root group=root mode=0644
notify: notify:
- systemd daemon-reload - Systemd daemon-reload
- name: Install zram-generator - name: Install zram-generator
pacman: name=zram-generator state=present pacman: name=zram-generator state=present
...@@ -99,7 +99,7 @@ ...@@ -99,7 +99,7 @@
- name: Install zram-generator config for zram - name: Install zram-generator config for zram
template: src=zram-generator.conf dest=/etc/systemd/zram-generator.conf owner=root group=root mode=0644 template: src=zram-generator.conf dest=/etc/systemd/zram-generator.conf owner=root group=root mode=0644
notify: notify:
- restart systemd-zram-setup@zram0 - Restart systemd-zram-setup@zram0
when: enable_zram_swap when: enable_zram_swap
- name: Disable zswap to prevent conflict with zram - name: Disable zswap to prevent conflict with zram
...@@ -123,7 +123,7 @@ ...@@ -123,7 +123,7 @@
- "-.slice" - "-.slice"
- user@.service - user@.service
notify: notify:
- systemd daemon-reload - Systemd daemon-reload
- name: Start systemd-oomd - name: Start systemd-oomd
service: name=systemd-oomd state=started enabled=yes service: name=systemd-oomd state=started enabled=yes
......
...@@ -34,7 +34,7 @@ ...@@ -34,7 +34,7 @@
- name: Set up nginx - name: Set up nginx
template: src=nginx.d.conf.j2 dest=/etc/nginx/nginx.d/dbscripts.conf owner=root group=root mode=0644 template: src=nginx.d.conf.j2 dest=/etc/nginx/nginx.d/dbscripts.conf owner=root group=root mode=0644
notify: notify:
- reload nginx - Reload nginx
tags: tags:
- nginx - nginx
...@@ -332,7 +332,7 @@ ...@@ -332,7 +332,7 @@
- createlinks.timer - createlinks.timer
- createlinks.service - createlinks.service
notify: notify:
- daemon reload - Daemon reload
- name: Activate systemd timers - name: Activate systemd timers
service: name={{ item }} enabled=yes state=started service: name={{ item }} enabled=yes state=started
......
...@@ -13,7 +13,7 @@ ...@@ -13,7 +13,7 @@
vars: vars:
debuginfod_package_path: "{{ debuginfod_package_paths | join(' ') }}" debuginfod_package_path: "{{ debuginfod_package_paths | join(' ') }}"
notify: notify:
- reload debuginfod - Reload debuginfod
- name: Create http directory for debuginfod website files - name: Create http directory for debuginfod website files
file: path=/srv/http/debuginfod state=directory owner=root group=root mode=0755 file: path=/srv/http/debuginfod state=directory owner=root group=root mode=0755
...@@ -39,7 +39,7 @@ ...@@ -39,7 +39,7 @@
- name: Set up nginx - name: Set up nginx
template: src=nginx.d.conf.j2 dest=/etc/nginx/nginx.d/debuginfod.conf owner=root group=root mode=0644 template: src=nginx.d.conf.j2 dest=/etc/nginx/nginx.d/debuginfod.conf owner=root group=root mode=0644
notify: notify:
- reload nginx - Reload nginx
when: debuginfod_domain when: debuginfod_domain
tags: ['nginx'] tags: ['nginx']
......
...@@ -11,7 +11,7 @@ ...@@ -11,7 +11,7 @@
- name: Install dovecot.conf - name: Install dovecot.conf
template: src=dovecot.conf.j2 dest=/etc/dovecot/dovecot.conf owner=root group=root mode=0644 template: src=dovecot.conf.j2 dest=/etc/dovecot/dovecot.conf owner=root group=root mode=0644
notify: notify:
- reload dovecot - Reload dovecot
- name: Add vmail group - name: Add vmail group
group: name=vmail gid=5000 group: name=vmail gid=5000
...@@ -28,7 +28,7 @@ ...@@ -28,7 +28,7 @@
- name: Install spam-to-folder.sieve - name: Install spam-to-folder.sieve
copy: src=spam-to-folder.sieve dest=/etc/dovecot/sieve/ mode=0644 owner=root group=root copy: src=spam-to-folder.sieve dest=/etc/dovecot/sieve/ mode=0644 owner=root group=root
notify: notify:
- run sievec - Run sievec
- name: Create ssl cert - name: Create ssl cert
include_role: include_role:
......
...@@ -3,7 +3,7 @@ ...@@ -3,7 +3,7 @@
name: "fail2ban" name: "fail2ban"
state: "present" state: "present"
notify: notify:
- restart fail2ban - Restart fail2ban
- name: Create systemd unit override path - name: Create systemd unit override path
file: file:
...@@ -32,7 +32,7 @@ ...@@ -32,7 +32,7 @@
- "fail2ban.local" - "fail2ban.local"
- "jail.local" - "jail.local"
notify: notify:
- restart fail2ban - Restart fail2ban
- name: Install firewallcmd-allports.local - name: Install firewallcmd-allports.local
template: template:
...@@ -42,7 +42,7 @@ ...@@ -42,7 +42,7 @@
group: "root" group: "root"
mode: 0644 mode: 0644
notify: notify:
- restart fail2ban - Restart fail2ban
- name: Install sshd jail - name: Install sshd jail
when: fail2ban_jails.sshd when: fail2ban_jails.sshd
...@@ -53,7 +53,7 @@ ...@@ -53,7 +53,7 @@
group: "root" group: "root"
mode: 0644 mode: 0644
notify: notify:
- reload fail2ban jails - Reload fail2ban jails
- name: Install postfix jail - name: Install postfix jail
when: fail2ban_jails.postfix when: fail2ban_jails.postfix
...@@ -64,7 +64,7 @@ ...@@ -64,7 +64,7 @@
group: "root" group: "root"
mode: 0644 mode: 0644
notify: notify:
- reload fail2ban jails - Reload fail2ban jails
- name: Install dovecot jail - name: Install dovecot jail
when: fail2ban_jails.dovecot when: fail2ban_jails.dovecot
...@@ -75,7 +75,7 @@ ...@@ -75,7 +75,7 @@
group: "root" group: "root"
mode: 0644 mode: 0644
notify: notify:
- reload fail2ban jails - Reload fail2ban jails
- name: Install nginx-limit-req jail - name: Install nginx-limit-req jail
when: fail2ban_jails.nginx_limit_req when: fail2ban_jails.nginx_limit_req
...@@ -86,7 +86,7 @@ ...@@ -86,7 +86,7 @@
group: "root" group: "root"
mode: 0644 mode: 0644
notify: notify:
- reload fail2ban jails - Reload fail2ban jails
- name: Start and enable service - name: Start and enable service
systemd: systemd:
......
...@@ -4,7 +4,7 @@ ...@@ -4,7 +4,7 @@
- name: Template fetchmail config - name: Template fetchmail config
template: src=fetchmailrc.j2 dest=/etc/fetchmailrc owner=fetchmail group=nobody mode=600 template: src=fetchmailrc.j2 dest=/etc/fetchmailrc owner=fetchmail group=nobody mode=600
notify: notify:
- restart fetchmail - Restart fetchmail
- name: Start and enable fetchmail - name: Start and enable fetchmail
service: name=fetchmail enabled=yes state=started service: name=fetchmail enabled=yes state=started
...@@ -6,7 +6,7 @@ ...@@ -6,7 +6,7 @@
- name: Install firewalld config - name: Install firewalld config
template: src=firewalld.conf.j2 dest=/etc/firewalld/firewalld.conf owner=root group=root mode=0644 template: src=firewalld.conf.j2 dest=/etc/firewalld/firewalld.conf owner=root group=root mode=0644
notify: notify:
- restart firewalld - Restart firewalld
- name: Start and enable firewalld - name: Start and enable firewalld
service: service:
......
...@@ -37,7 +37,7 @@ ...@@ -37,7 +37,7 @@
template: > template: >
src=nginx.conf.j2 dest=/etc/nginx/nginx.d/fluxbb.conf src=nginx.conf.j2 dest=/etc/nginx/nginx.d/fluxbb.conf
owner=root group=root mode=0644 owner=root group=root mode=0644
notify: reload nginx notify: Reload nginx
- name: Install python-passlib - name: Install python-passlib
pacman: name=python-passlib pacman: name=python-passlib
...@@ -61,7 +61,7 @@ ...@@ -61,7 +61,7 @@
template: > template: >
src=php-fpm.conf.j2 dest=/etc/php/php-fpm.d/fluxbb.conf src=php-fpm.conf.j2 dest=/etc/php/php-fpm.d/fluxbb.conf
owner=root group=root mode=0644 owner=root group=root mode=0644
notify: restart php-fpm@fluxbb notify: Restart php-fpm@fluxbb
- name: Start and enable systemd socket - name: Start and enable systemd socket
service: name=php-fpm@fluxbb.socket state=started enabled=true service: name=php-fpm@fluxbb.socket state=started enabled=true
...@@ -27,7 +27,7 @@ ...@@ -27,7 +27,7 @@
- name: Set up nginx - name: Set up nginx
template: src=nginx.d.conf.j2 dest="{{ flyspray_nginx_conf }}" owner=root group=root mode=644 template: src=nginx.d.conf.j2 dest="{{ flyspray_nginx_conf }}" owner=root group=root mode=644
notify: notify:
- reload nginx - Reload nginx
when: maintenance is not defined when: maintenance is not defined
tags: ['nginx'] tags: ['nginx']
...@@ -73,19 +73,19 @@ ...@@ -73,19 +73,19 @@
src=php-fpm.conf.j2 dest="/etc/php7/php-fpm.d/{{ flyspray_user }}.conf" src=php-fpm.conf.j2 dest="/etc/php7/php-fpm.d/{{ flyspray_user }}.conf"
owner=root group=root mode=0644 owner=root group=root mode=0644
notify: notify:
- restart php-fpm7@flyspray - Restart php-fpm7@flyspray
- name: Install fail2ban register ban filter - name: Install fail2ban register ban filter
template: src=fail2ban.filter.j2 dest=/etc/fail2ban/filter.d/nginx-flyspray-register.local owner=root group=root mode=0644 template: src=fail2ban.filter.j2 dest=/etc/fail2ban/filter.d/nginx-flyspray-register.local owner=root group=root mode=0644
notify: notify:
- restart fail2ban - Restart fail2ban
tags: tags:
- fail2ban - fail2ban
- name: Install fail2ban register ban jail - name: Install fail2ban register ban jail
template: src=fail2ban.jail.j2 dest=/etc/fail2ban/jail.d/nginx-flyspray-register.local owner=root group=root mode=0644 template: src=fail2ban.jail.j2 dest=/etc/fail2ban/jail.d/nginx-flyspray-register.local owner=root group=root mode=0644
notify: notify:
- restart fail2ban - Restart fail2ban
tags: tags:
- fail2ban - fail2ban
......
...@@ -6,7 +6,7 @@ ...@@ -6,7 +6,7 @@
loop: loop:
- {src: pdns.conf.j2, dest: pdns.conf} - {src: pdns.conf.j2, dest: pdns.conf}
- {src: geo.yml.j2, dest: geo.yml} - {src: geo.yml.j2, dest: geo.yml}
notify: restart powerdns notify: Restart powerdns
- name: Create drop-in directory for geoipupdate - name: Create drop-in directory for geoipupdate
file: path=/etc/systemd/system/geoipupdate.service.d state=directory owner=root group=root mode=0755 file: path=/etc/systemd/system/geoipupdate.service.d state=directory owner=root group=root mode=0755
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment