Skip to content

Commit 7af432e

Browse files
authored
Uppercased first letter of task names. (#422)
Signed-off-by: Farid Joubbi <[email protected]>
1 parent 2dac5e3 commit 7af432e

31 files changed

+154
-154
lines changed

roles/mysql_hardening/handlers/main.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22

3-
- name: restart mysql
3+
- name: Restart mysql
44
service:
55
name: '{{ mysql_daemon }}'
66
state: restarted
Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
- name: protect my.cnf
2+
- name: Protect my.cnf
33
file:
44
path: '{{ mysql_hardening_mysql_conf_file }}'
55
mode: '0640'
@@ -8,49 +8,49 @@
88
follow: true
99
state: file
1010

11-
- name: ensure permissions on mysql-datadir are correct
11+
- name: Ensure permissions on mysql-datadir are correct
1212
file:
1313
path: '{{ mysql_datadir }}'
1414
state: directory
1515
owner: '{{ mysql_hardening_user }}'
1616
group: '{{ mysql_hardening_user }}'
1717
mode: '0750'
1818

19-
- name: ensure permissions on mysql-logfile are correct
19+
- name: Ensure permissions on mysql-logfile are correct
2020
file:
2121
path: '{{ mysql_hardening_log_file }}'
2222
state: file
2323
owner: '{{ mysql_hardening_user }}'
2424
group: '{{ mysql_hardening_group }}'
2525
mode: '0640'
2626

27-
- name: check mysql configuration-directory exists and has right permissions
27+
- name: Check mysql configuration-directory exists and has right permissions
2828
file:
2929
path: '{{ mysql_hardening_mysql_confd_dir }}'
3030
state: directory
3131
owner: '{{ mysql_hardening_user }}'
3232
group: '{{ mysql_hardening_group }}'
3333
mode: '0750'
3434

35-
- name: check include-dir directive is present in my.cnf
35+
- name: Check include-dir directive is present in my.cnf
3636
lineinfile:
3737
dest: '{{ mysql_hardening_mysql_conf_file }}'
3838
line: '!includedir {{ mysql_hardening_mysql_confd_dir }}'
3939
insertafter: 'EOF'
4040
state: present
4141
backup: true
42-
notify: restart mysql
42+
notify: Restart mysql
4343

44-
- name: apply hardening configuration
44+
- name: Apply hardening configuration
4545
template:
4646
src: 'hardening.cnf.j2'
4747
dest: '{{ mysql_hardening_mysql_hardening_conf_file }}'
4848
owner: '{{ mysql_cnf_owner }}'
4949
group: '{{ mysql_cnf_group }}'
5050
mode: '0640'
51-
notify: restart mysql
51+
notify: Restart mysql
5252

53-
- name: enable mysql
53+
- name: Enable mysql
5454
service:
5555
name: '{{ mysql_daemon }}'
5656
enabled: '{{ mysql_daemon_enabled }}'

roles/mysql_hardening/tasks/mysql_secure_installation.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,40 +1,40 @@
11
---
2-
- name: fail the role if the mysql root password was not set
2+
- name: Fail the role if the mysql root password was not set
33
fail:
44
msg: 'ERROR - you have to change default mysql_root_password'
55
when: mysql_root_password == '-----====>SetR00tPa$$wordH3r3!!!<====-----'
66

7-
- name: root password is present
7+
- name: Root password is present
88
mysql_user:
99
name: 'root'
1010
host_all: true
1111
password: '{{ mysql_root_password | mandatory }}'
1212
state: present
1313
login_unix_socket: "{{ login_unix_socket | default(omit) }}"
1414

15-
- name: install .my.cnf with credentials
15+
- name: Install .my.cnf with credentials
1616
template:
1717
src: 'my.cnf.j2'
1818
dest: '{{ mysql_user_home }}/.my.cnf'
1919
mode: '0400'
2020
tags: my_cnf
2121

22-
- name: test database is absent
22+
- name: Test database is absent
2323
mysql_db:
2424
name: test
2525
state: absent
2626
login_unix_socket: "{{ login_unix_socket | default(omit) }}"
2727
when: mysql_remove_test_database
2828

29-
- name: anonymous users are absent
29+
- name: Anonymous users are absent
3030
mysql_user:
3131
name: ''
3232
state: absent
3333
host_all: true
3434
login_unix_socket: "{{ login_unix_socket | default(omit) }}"
3535
when: mysql_remove_anonymous_users
3636

37-
- name: remove remote root
37+
- name: Remove remote root
3838
community.mysql.mysql_query:
3939
query:
4040
- DELETE FROM mysql.user WHERE User='root' AND Host NOT IN ('localhost', '127.0.0.1', '::1')
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
- name: restart nginx
2+
- name: Restart nginx
33
service:
44
name: "nginx"
55
state: restarted
Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
2-
- name: create additional configuration
2+
- name: Create additional configuration
33
template:
44
src: "hardening.conf.j2"
55
dest: "/etc/nginx/conf.d/90.hardening.conf"
66
mode: '0600'
77
owner: "root"
88
group: "root"
9-
notify: restart nginx
9+
notify: Restart nginx
1010

11-
- name: change configuration in main nginx.conf
11+
- name: Change configuration in main nginx.conf
1212
lineinfile:
1313
dest: "/etc/nginx/nginx.conf"
1414
regexp: '^\s*server_tokens'
@@ -17,9 +17,9 @@
1717
mode: '0640'
1818
owner: "root"
1919
group: "root"
20-
notify: restart nginx
20+
notify: Restart nginx
2121

22-
- name: change ssl_protocols in main nginx.conf
22+
- name: Change ssl_protocols in main nginx.conf
2323
lineinfile:
2424
dest: "/etc/nginx/nginx.conf"
2525
regexp: '^\s*ssl_protocols'
@@ -28,9 +28,9 @@
2828
mode: '0640'
2929
owner: "root"
3030
group: "root"
31-
notify: restart nginx
31+
notify: Restart nginx
3232

33-
- name: change ssl_prefer_server_ciphers in main nginx.conf
33+
- name: Change ssl_prefer_server_ciphers in main nginx.conf
3434
lineinfile:
3535
dest: "/etc/nginx/nginx.conf"
3636
regexp: '^\s*ssl_prefer_server_ciphers'
@@ -39,9 +39,9 @@
3939
mode: '0640'
4040
owner: "root"
4141
group: "root"
42-
notify: restart nginx
42+
notify: Restart nginx
4343

44-
- name: change client_max_body_size in main nginx.conf
44+
- name: Change client_max_body_size in main nginx.conf
4545
lineinfile:
4646
dest: "/etc/nginx/nginx.conf"
4747
regexp: '^\s*client_max_body_size'
@@ -50,9 +50,9 @@
5050
mode: '0640'
5151
owner: "root"
5252
group: "root"
53-
notify: restart nginx
53+
notify: Restart nginx
5454

55-
- name: change client_body_buffer_size in main nginx.conf
55+
- name: Change client_body_buffer_size in main nginx.conf
5656
lineinfile:
5757
dest: "/etc/nginx/nginx.conf"
5858
regexp: '^\s*client_body_buffer_size'
@@ -61,9 +61,9 @@
6161
mode: '0640'
6262
owner: "root"
6363
group: "root"
64-
notify: restart nginx
64+
notify: Restart nginx
6565

66-
- name: change keepalive_timeout in main nginx.conf
66+
- name: Change keepalive_timeout in main nginx.conf
6767
lineinfile:
6868
dest: "/etc/nginx/nginx.conf"
6969
regexp: '^\s*keepalive_timeout'
@@ -72,23 +72,23 @@
7272
mode: '0640'
7373
owner: "root"
7474
group: "root"
75-
notify: restart nginx
75+
notify: Restart nginx
7676

77-
- name: remove default.conf
77+
- name: Remove default.conf
7878
file:
7979
path: "{{ item }}"
8080
state: absent
8181
when: nginx_remove_default_site
82-
notify: restart nginx
82+
notify: Restart nginx
8383
loop:
8484
- "/etc/nginx/conf.d/default.conf"
8585
- "/etc/nginx/sites-enabled/default"
8686

87-
- name: generate dh group
87+
- name: Generate dh group
8888
openssl_dhparam:
8989
path: "/etc/nginx/dh{{ nginx_dh_size }}.pem"
9090
size: "{{ nginx_dh_size }}"
9191
mode: '0640'
9292
owner: "root"
9393
group: "root"
94-
notify: restart nginx
94+
notify: Restart nginx
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,3 @@
11
---
2-
- name: update-initramfs
2+
- name: Update-initramfs
33
command: 'update-initramfs -u'

roles/os_hardening/tasks/apt.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
- name: remove deprecated or insecure packages | package-01 - package-09
2+
- name: Remove deprecated or insecure packages | package-01 - package-09
33
apt:
44
name: '{{ os_security_packages_list }}'
55
state: 'absent'

roles/os_hardening/tasks/auditd.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
2-
- name: install auditd package | package-08
2+
- name: Install auditd package | package-08
33
package:
44
name: '{{ auditd_package }}'
55
state: 'present'
66

7-
- name: configure auditd | package-08
7+
- name: Configure auditd | package-08
88
template:
99
src: 'etc/audit/auditd.conf.j2'
1010
dest: '/etc/audit/auditd.conf'

roles/os_hardening/tasks/limits.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
- block:
3-
- name: create limits.d-directory if it does not exist | sysctl-31a, sysctl-31b
3+
- name: Create limits.d-directory if it does not exist | sysctl-31a, sysctl-31b
44
file:
55
path: '/etc/security/limits.d'
66
owner: 'root'
77
group: 'root'
88
mode: '0755'
99
state: 'directory'
1010

11-
- name: create additional limits config file -> 10.hardcore.conf | sysctl-31a, sysctl-31b
11+
- name: Create additional limits config file -> 10.hardcore.conf | sysctl-31a, sysctl-31b
1212
pam_limits:
1313
dest: '/etc/security/limits.d/10.hardcore.conf'
1414
domain: '*'
@@ -17,7 +17,7 @@
1717
value: '0'
1818
comment: Prevent core dumps for all users. These are usually not needed and may contain sensitive information
1919

20-
- name: set 10.hardcore.conf perms to 0400 and root ownership
20+
- name: Set 10.hardcore.conf perms to 0400 and root ownership
2121
file:
2222
path: /etc/security/limits.d/10.hardcore.conf
2323
owner: 'root'
@@ -29,7 +29,7 @@
2929

3030
when: not os_security_kernel_enable_core_dump | bool
3131

32-
- name: remove 10.hardcore.conf config file
32+
- name: Remove 10.hardcore.conf config file
3333
file:
3434
path: /etc/security/limits.d/10.hardcore.conf
3535
state: absent

roles/os_hardening/tasks/login_defs.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
- name: create login.defs | os-05, os-05b
2+
- name: Create login.defs | os-05, os-05b
33
template:
44
src: 'etc/login.defs.j2'
55
dest: '/etc/login.defs'

0 commit comments

Comments
 (0)