From 1428068e3dd03597689ed8cf093276281a50fea3 Mon Sep 17 00:00:00 2001
From: entlein <einentlein@gmail.com>
Date: Mon, 18 Jul 2022 14:55:48 +0200
Subject: [PATCH] cleanup

---
 roles/rke2/tasks/privkey.yml    | 17 -----------------
 roles/rke2/tasks/setup_host.yml |  8 --------
 2 files changed, 25 deletions(-)
 delete mode 100644 roles/rke2/tasks/privkey.yml

diff --git a/roles/rke2/tasks/privkey.yml b/roles/rke2/tasks/privkey.yml
deleted file mode 100644
index a7ea03b..0000000
--- a/roles/rke2/tasks/privkey.yml
+++ /dev/null
@@ -1,17 +0,0 @@
-
-- name: wait for private key to exist
-  wait_for:
-    path: /var/lib/rancher/rke2/server/tls/service.key
-
-- name: generate public key from private key for jwks 
-  shell: |
-    openssl rsa -in /var/lib/rancher/rke2/server/tls/service.key -pubout -out /var/lib/rancher/rke2/server/tls/service.pub
-  
-
-- name: fetch public key from master
-  ansible.builtin.fetch:
-    src: /var/lib/rancher/rke2/server/tls/service.pub
-    dest: service.pub
-    flat: yes
-
-
diff --git a/roles/rke2/tasks/setup_host.yml b/roles/rke2/tasks/setup_host.yml
index 307c2b3..b8d3d36 100644
--- a/roles/rke2/tasks/setup_host.yml
+++ b/roles/rke2/tasks/setup_host.yml
@@ -65,14 +65,6 @@
     group: etcd
 
 
-#Let openstack cloud controller access the /etc/ssl/certs directory (SELinux)
-
-# - name: Disable SELinux
-#   selinux:
-#     policy: targeted
-#     state: permissive
-#   when: ( 'control-plane' in group_names )
-#Download the mozilla root CA into the right directory, and update the trust chain
 - name: Download root CA
   get_url:
     url: https://curl.se/ca/cacert.pem
-- 
GitLab