From 1428068e3dd03597689ed8cf093276281a50fea3 Mon Sep 17 00:00:00 2001 From: entlein <einentlein@gmail.com> Date: Mon, 18 Jul 2022 14:55:48 +0200 Subject: [PATCH] cleanup --- roles/rke2/tasks/privkey.yml | 17 ----------------- roles/rke2/tasks/setup_host.yml | 8 -------- 2 files changed, 25 deletions(-) delete mode 100644 roles/rke2/tasks/privkey.yml diff --git a/roles/rke2/tasks/privkey.yml b/roles/rke2/tasks/privkey.yml deleted file mode 100644 index a7ea03b..0000000 --- a/roles/rke2/tasks/privkey.yml +++ /dev/null @@ -1,17 +0,0 @@ - -- name: wait for private key to exist - wait_for: - path: /var/lib/rancher/rke2/server/tls/service.key - -- name: generate public key from private key for jwks - shell: | - openssl rsa -in /var/lib/rancher/rke2/server/tls/service.key -pubout -out /var/lib/rancher/rke2/server/tls/service.pub - - -- name: fetch public key from master - ansible.builtin.fetch: - src: /var/lib/rancher/rke2/server/tls/service.pub - dest: service.pub - flat: yes - - diff --git a/roles/rke2/tasks/setup_host.yml b/roles/rke2/tasks/setup_host.yml index 307c2b3..b8d3d36 100644 --- a/roles/rke2/tasks/setup_host.yml +++ b/roles/rke2/tasks/setup_host.yml @@ -65,14 +65,6 @@ group: etcd -#Let openstack cloud controller access the /etc/ssl/certs directory (SELinux) - -# - name: Disable SELinux -# selinux: -# policy: targeted -# state: permissive -# when: ( 'control-plane' in group_names ) -#Download the mozilla root CA into the right directory, and update the trust chain - name: Download root CA get_url: url: https://curl.se/ca/cacert.pem -- GitLab