refactor(systemd-services): migrate SYS_SERVICE_SUFFIX usage to get_service_name filter

Replaced all hardcoded service name concatenations with the new get_service_name filter.
This ensures consistency, proper lowercase formatting, and correct handling of '@' suffixed units.

Added unittests for the filter (normal, custom suffix, '@'-units, and lowercase normalization).

Context: see ChatGPT discussion https://chatgpt.com/share/68a38beb-b9bc-800f-b7ed-cdd2b64b2604
This commit is contained in:
Kevin Veen-Birkenbach 2025-08-18 22:24:33 +02:00
parent 4a600ac531
commit bf63e01b98
No known key found for this signature in database
GPG Key ID: 44D8F11FD62F878E
12 changed files with 63 additions and 23 deletions

View File

@ -17,7 +17,7 @@ def get_service_name(systemctl_id, software_name, suffix="service"):
base = sid[:-1] # drop the trailing '@' base = sid[:-1] # drop the trailing '@'
return f"{base}.{sw}@.{sfx}" return f"{base}.{sw}@.{sfx}"
else: else:
return f"{sid}{sw}.{sfx}" return f"{sid}.{sw}.{sfx}"
class FilterModule(object): class FilterModule(object):

View File

@ -5,12 +5,12 @@
SYS_SERVICE_SUFFIX: ".{{ SOFTWARE_NAME | lower }}.service" SYS_SERVICE_SUFFIX: ".{{ SOFTWARE_NAME | lower }}.service"
## Names ## Names
SYS_SERVICE_CLEANUP_BACKUPS_OLD: "sys-ctl-cln-backups{{ SYS_SERVICE_SUFFIX }}" SYS_SERVICE_CLEANUP_BACKUPS_OLD: "{{ 'sys-ctl-cln-backups' | get_service_name(SOFTWARE_NAME) }}"
SYS_SERVICE_CLEANUP_BACKUPS_FAILED: "sys-ctl-cln-faild-bkps{{ SYS_SERVICE_SUFFIX }}" SYS_SERVICE_CLEANUP_BACKUPS_FAILED: "{{ 'sys-ctl-cln-faild-bkps' | get_service_name(SOFTWARE_NAME) }}"
SYS_SERVICE_OPTIMIZE_DRIVE: "svc-opt-ssd-hdd{{ SYS_SERVICE_SUFFIX }}" SYS_SERVICE_OPTIMIZE_DRIVE: "{{ 'svc-opt-ssd-hdd' | get_service_name(SOFTWARE_NAME) }}"
SYS_SERVICE_BACKUP_RMT_2_LOC: "svc-bkp-rmt-2-loc{{ SYS_SERVICE_SUFFIX }}" SYS_SERVICE_BACKUP_RMT_2_LOC: "{{ 'svc-bkp-rmt-2-loc' | get_service_name(SOFTWARE_NAME) }}"
SYS_SERVICE_REPAIR_DOCKER_HARD: "sys-ctl-rpr-docker-hard{{ SYS_SERVICE_SUFFIX }}" SYS_SERVICE_REPAIR_DOCKER_HARD: "{{ 'sys-ctl-rpr-docker-hard' | get_service_name(SOFTWARE_NAME) }}"
SYS_SERVICE_UPDATE_DOCKER: "update-docker{{ SYS_SERVICE_SUFFIX }}" SYS_SERVICE_UPDATE_DOCKER: "{{ 'update-docker' | get_service_name(SOFTWARE_NAME) }}"
## On Failure ## On Failure
SYS_SERVICE_ON_FAILURE_COMPOSE: "sys-ctl-alm-compose.{{ SOFTWARE_NAME }}@%i.service" SYS_SERVICE_ON_FAILURE_COMPOSE: "sys-ctl-alm-compose.{{ SOFTWARE_NAME }}@%i.service"

View File

@ -1,5 +1,6 @@
- name: "reload svc-bkp-loc-2-usb service" - name: "reload svc-bkp-loc-2-usb service"
systemd: systemd:
name: svc-bkp-loc-2-usb{{ SYS_SERVICE_SUFFIX }} name: "{{ 'svc-bkp-loc-2-usb' | get_service_name(SOFTWARE_NAME) }}"
state: reloaded state: reloaded
daemon_reload: yes daemon_reload: yes

View File

@ -9,17 +9,17 @@ To track what the service is doing, execute one of the following commands:
#### Using systemctl #### Using systemctl
```bash ```bash
watch -n2 "systemctl status sys-bkp-rmt-2-loc{{ SYS_SERVICE_SUFFIX }}" watch -n2 "systemctl status {{ 'sys-bkp-rmt-2-loc' | get_service_name(SOFTWARE_NAME) }}"
``` ```
#### Using journalctl #### Using journalctl
```bash ```bash
journalctl -fu sys-bkp-rmt-2-loc{{ SYS_SERVICE_SUFFIX }} journalctl -fu {{ 'sys-bkp-rmt-2-loc' | get_service_name(SOFTWARE_NAME) }}
``` ```
### Viewing History ### Viewing History
```bash ```bash
sudo journalctl -u sys-bkp-rmt-2-loc{{ SYS_SERVICE_SUFFIX }} sudo journalctl -u {{ 'sys-bkp-rmt-2-loc' | get_service_name(SOFTWARE_NAME) }}
``` ```

View File

@ -17,12 +17,12 @@
### Activate Configuration ### Activate Configuration
```bash ```bash
cp /path/to/wg0.conf /etc/wireguard/wg0.conf cp /path/to/wg0.conf /etc/wireguard/wg0.conf
systemctl enable wg-quick@wg0{{ SYS_SERVICE_SUFFIX }} --now systemctl enable wg-quick@wg0.service --now
``` ```
### Check status ### Check status
```bash ```bash
systemctl status wg-quick@wg0{{ SYS_SERVICE_SUFFIX }} systemctl status wg-quick@wg0.service
``` ```
## Other Resources ## Other Resources

View File

@ -1,6 +1,6 @@
- name: "restart wireguard" - name: "restart wireguard"
systemd: systemd:
name: wg-quick@wg0{{ SYS_SERVICE_SUFFIX }} name: wg-quick@wg0.service
state: restarted state: restarted
enabled: yes enabled: yes
daemon_reload: yes daemon_reload: yes

View File

@ -7,7 +7,7 @@ This role manages WireGuard on a client system. It sets up essential services an
## Overview ## Overview
Optimized for client configurations, this role: Optimized for client configurations, this role:
- Deploys a systemd service (`set-mtu{{ SYS_SERVICE_SUFFIX }}`) and its associated script to set the MTU on specified network interfaces. - Deploys a systemd service and its associated script to set the MTU on specified network interfaces.
- Uses a Jinja2 template to generate the `set-mtu.sh` script. - Uses a Jinja2 template to generate the `set-mtu.sh` script.
- Ensures that the MTU is configured correctly before starting WireGuard with [wg-quick](https://www.wireguard.com/quickstart/). - Ensures that the MTU is configured correctly before starting WireGuard with [wg-quick](https://www.wireguard.com/quickstart/).

View File

@ -1,10 +1,10 @@
[Unit] [Unit]
Description=set MTU Description=set MTU
Before=wg-quick@wg0{{ SYS_SERVICE_SUFFIX }} Before=wg-quick@wg0.service
[Service] [Service]
Type=oneshot Type=oneshot
ExecStart=bash {{ systemctl_id | get_service_script_path('sh') }} ExecStart=bash {{ systemctl_id | get_service_script_path('sh') }}
[Install] [Install]
RequiredBy=wg-quick@wg0{{ SYS_SERVICE_SUFFIX }} RequiredBy=wg-quick@wg0.service

View File

@ -6,4 +6,4 @@ OnFailure={{ SYS_SERVICE_ON_FAILURE_COMPOSE }} {{ SYS_SERVICE_CLEANUP_BACKUPS_FA
Type=oneshot Type=oneshot
ExecStartPre=/bin/sh -c '/usr/bin/python {{ PATH_SYSTEM_LOCK_SCRIPT }} {{ SYS_SERVICE_GROUP_MANIPULATION | join(' ') }} --ignore {{ SYS_SERVICE_GROUP_BACKUPS | reject('equalto', role_name ~ '-everything') | join(' ') }} --timeout "{{ SYS_TIMEOUT_BACKUP_SERVICES }}"' ExecStartPre=/bin/sh -c '/usr/bin/python {{ PATH_SYSTEM_LOCK_SCRIPT }} {{ SYS_SERVICE_GROUP_MANIPULATION | join(' ') }} --ignore {{ SYS_SERVICE_GROUP_BACKUPS | reject('equalto', role_name ~ '-everything') | join(' ') }} --timeout "{{ SYS_TIMEOUT_BACKUP_SERVICES }}"'
ExecStart=/bin/sh -c '{{ BKP_DOCKER_2_LOC_EXEC }}' ExecStart=/bin/sh -c '{{ BKP_DOCKER_2_LOC_EXEC }}'
ExecStartPost=/bin/sh -c '/bin/systemctl start sys-ctl-rpr-docker-soft{{ SYS_SERVICE_SUFFIX }} &' ExecStartPost=/bin/sh -c '/bin/systemctl start {{ 'sys-ctl-rpr-docker-soft' | get_service_name(SOFTWARE_NAME) }} &'

View File

@ -7,7 +7,7 @@ This Ansible role automates the detection, revocation and deletion of unused Let
## Overview ## Overview
- Installs the `certreap` cleanup tool using the `pkgmgr-install` role - Installs the `certreap` cleanup tool using the `pkgmgr-install` role
- Deploys and configures a `sys-ctl-cln-certs{{ SYS_SERVICE_SUFFIX }}` systemd unit - Deploys and configures a systemd unit
- (Optionally) Sets up a recurring cleanup via a systemd timer using the `sys-timer` role - (Optionally) Sets up a recurring cleanup via a systemd timer using the `sys-timer` role
- Integrates with `sys-ctl-alm-compose` to send failure notifications - Integrates with `sys-ctl-alm-compose` to send failure notifications
- Ensures idempotent execution with a `run_once_sys_ctl_cln_certs` flag - Ensures idempotent execution with a `run_once_sys_ctl_cln_certs` flag
@ -18,7 +18,7 @@ This Ansible role automates the detection, revocation and deletion of unused Let
Uses `pkgmgr-install` to install the `certreap` binary. Uses `pkgmgr-install` to install the `certreap` binary.
- **Systemd Service Configuration** - **Systemd Service Configuration**
Deploys `sys-ctl-cln-certs{{ SYS_SERVICE_SUFFIX }}` and reloads/restarts it on changes. Deploys service and reloads/restarts it on changes.
- **Systemd Timer Scheduling** - **Systemd Timer Scheduling**
Optionally wires in a timer via the `sys-timer` role, controlled by the `on_calendar_cleanup_certs` variable. Optionally wires in a timer via the `sys-timer` role, controlled by the `on_calendar_cleanup_certs` variable.
@ -27,7 +27,7 @@ This Ansible role automates the detection, revocation and deletion of unused Let
Prevents multiple runs in one play by setting a `run_once_sys_ctl_cln_certs` fact. Prevents multiple runs in one play by setting a `run_once_sys_ctl_cln_certs` fact.
- **Failure Notification** - **Failure Notification**
Triggers `sys-ctl-alm-compose.infinito@sys-ctl-cln-certs{{ SYS_SERVICE_SUFFIX }}` on failure. Triggers service on failure.
## Further Resources ## Further Resources

View File

@ -3,9 +3,9 @@
name: sys-lock name: sys-lock
when: run_once_sys_lock is not defined when: run_once_sys_lock is not defined
- name: "start sys-ctl-bkp-docker-2-loc-everything{{ SYS_SERVICE_SUFFIX }}" - name: "start {{ 'sys-ctl-bkp-docker-2-loc-everything' | get_service_name(SOFTWARE_NAME) }}"
systemd: systemd:
name: sys-ctl-bkp-docker-2-loc-everything{{ SYS_SERVICE_SUFFIX }} name: "{{ 'sys-ctl-bkp-docker-2-loc-everything' | get_service_name(SOFTWARE_NAME) }}"
state: started state: started
when: when:
- MODE_BACKUP | bool - MODE_BACKUP | bool

View File

@ -0,0 +1,39 @@
import unittest
from filter_plugins import get_service_name
class TestGetServiceName(unittest.TestCase):
def test_normal_service(self):
# Expect a dot between id and software name
self.assertEqual(
get_service_name.get_service_name("sys-ctl-cln-backups", "nginx"),
"sys-ctl-cln-backups.nginx.service"
)
def test_normal_service_custom_suffix(self):
self.assertEqual(
get_service_name.get_service_name("sys-ctl-cln-backups", "nginx", "timer"),
"sys-ctl-cln-backups.nginx.timer"
)
def test_with_at_suffix(self):
# If systemctl_id ends with '@', @ is moved behind software name
self.assertEqual(
get_service_name.get_service_name("sys-ctl-bkp@", "postgres"),
"sys-ctl-bkp.postgres@.service"
)
def test_with_at_and_custom_suffix(self):
self.assertEqual(
get_service_name.get_service_name("sys-ctl-bkp@", "postgres", "timer"),
"sys-ctl-bkp.postgres@.timer"
)
def test_case_is_lowered(self):
self.assertEqual(
get_service_name.get_service_name("Sys-CTL-BKP@", "Postgres", "SeRviCe"),
"sys-ctl-bkp.postgres@.service"
)
if __name__ == "__main__":
unittest.main()