From 0445fed560e6fff60fed80a5c15b38874524ec06 Mon Sep 17 00:00:00 2001 From: spmfox Date: Thu, 29 Aug 2024 16:03:45 -0400 Subject: making naming more consistant --- roles/host/tasks/main.yml | 4 ++-- roles/host/tasks/unprivileged-port.yml | 11 +++++++++++ roles/host/tasks/unprivileged-ports.yml | 11 ----------- 3 files changed, 13 insertions(+), 13 deletions(-) create mode 100644 roles/host/tasks/unprivileged-port.yml delete mode 100644 roles/host/tasks/unprivileged-ports.yml (limited to 'roles') diff --git a/roles/host/tasks/main.yml b/roles/host/tasks/main.yml index 5b9dd6b..3b92a94 100644 --- a/roles/host/tasks/main.yml +++ b/roles/host/tasks/main.yml @@ -8,10 +8,10 @@ - ansible.builtin.import_tasks: systemd-user-network-check.yml -- ansible.builtin.import_tasks: unprivileged-ports.yml +- ansible.builtin.import_tasks: unprivileged-port.yml tags: - never - - unprivileged-ports + - unprivileged-port - ansible.builtin.import_tasks: cpanel-dnsonly.yml tags: diff --git a/roles/host/tasks/unprivileged-port.yml b/roles/host/tasks/unprivileged-port.yml new file mode 100644 index 0000000..c724e49 --- /dev/null +++ b/roles/host/tasks/unprivileged-port.yml @@ -0,0 +1,11 @@ +- name: Set unprivileged ports sysctl parameter in /etc/sysctl.d/50-UnprivilegedPort.conf + ansible.builtin.lineinfile: + path: "/etc/sysctl.d/50-UnprivilegedPort.conf" + regexp: "^net.ipv4.ip_unprivileged_port_start=" + line: "net.ipv4.ip_unprivileged_port_start={{ host_unprivileged_port_start }}" + create: true + register: sysctl + +- name: Reload sysctl + ansible.builtin.shell: "sysctl -p /etc/sysctl.d/50-UnprivilegedPort.conf" + when: sysctl.changed diff --git a/roles/host/tasks/unprivileged-ports.yml b/roles/host/tasks/unprivileged-ports.yml deleted file mode 100644 index b6afd29..0000000 --- a/roles/host/tasks/unprivileged-ports.yml +++ /dev/null @@ -1,11 +0,0 @@ -- name: Set unprivileged ports sysctl parameter in /etc/sysctl.d/50-UnprivilegedPorts.conf - ansible.builtin.lineinfile: - path: "/etc/sysctl.d/50-UnprivilegedPorts.conf" - regexp: "^net.ipv4.ip_unprivileged_port_start=" - line: "net.ipv4.ip_unprivileged_port_start={{ host_unprivileged_ports_start }}" - create: true - register: sysctl - -- name: Reload sysctl - ansible.builtin.shell: "sysctl -p /etc/sysctl.d/50-UnprivilegedPorts.conf" - when: sysctl.changed -- cgit