We will not be using ssl here so can remove this role

Change-Id: I5e355f5bf778a94c7ef7da63e2c1e16e0640c0d3
This commit is contained in:
Tim Kuhlman 2014-12-11 11:30:23 -07:00
parent 6ecab8db22
commit 090a4479fc
6 changed files with 0 additions and 97 deletions

View File

@ -1,78 +0,0 @@
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 18228010730921228119 (0xfcf6e72f02917757)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=Colorado, O=HP, OU=Monasca, CN=monasca_test
Validity
Not Before: Nov 21 23:50:20 2014 GMT
Not After : Nov 20 23:50:20 2017 GMT
Subject: C=US, ST=Colorado, O=HP, OU=Monasca, CN=monasca_test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:f9:7b:b6:67:4f:c1:33:a8:17:6f:01:bb:0c:a3:
2a:b4:36:74:37:81:7c:69:b9:1c:f9:37:c8:f5:1d:
18:40:d1:b3:ed:4b:3a:9f:27:58:97:8b:f9:0d:5b:
d5:29:89:50:4c:59:c8:d2:58:c6:f6:e8:35:25:d7:
6f:62:fa:8a:e5:a5:fc:54:63:94:2f:43:7e:87:84:
b6:0c:90:c6:5e:ee:d4:9e:e7:8c:56:bf:b0:09:bc:
e3:44:a9:d0:69:e3:fa:19:e4:18:45:fa:9f:dc:7b:
12:10:65:d8:9c:6d:da:58:97:87:79:62:2b:f1:12:
19:10:3e:b4:b2:e1:0b:34:25:a8:80:e4:3b:4c:a8:
30:1e:ab:33:8e:64:39:77:c7:94:95:a6:91:cf:bd:
5a:21:b2:27:e7:6f:dd:1f:ef:d4:fd:4c:36:d4:32:
3a:c5:79:07:3e:db:35:4e:de:b5:11:20:bf:22:94:
d5:af:ac:9c:f7:c5:32:7f:37:aa:e4:0d:62:67:e8:
ef:a0:3a:86:5b:bb:90:22:ed:f9:a0:9b:38:c2:c7:
ff:f2:44:e9:c4:57:b7:f8:e9:b2:70:42:4a:da:cc:
80:61:a2:90:86:22:0d:5d:06:10:d1:e8:3e:76:c1:
3c:d5:cf:06:c6:1f:a6:0a:5f:bd:95:4b:f6:24:50:
ff:67
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Subject Key Identifier:
E2:F6:22:3D:AE:E7:04:01:0B:C5:4B:60:FE:A0:54:72:46:98:08:C3
X509v3 Authority Key Identifier:
keyid:E2:F6:22:3D:AE:E7:04:01:0B:C5:4B:60:FE:A0:54:72:46:98:08:C3
X509v3 Basic Constraints:
CA:TRUE
Signature Algorithm: sha256WithRSAEncryption
b7:90:2f:b2:f4:f3:56:4e:da:58:96:5c:d0:f4:62:44:7a:ab:
a4:20:db:69:c0:48:6d:86:51:e0:c5:cd:91:ba:c5:d7:79:ec:
5b:7f:5d:51:88:7d:4f:be:9b:d9:80:3c:2a:b7:b6:52:5f:fe:
5c:c6:85:0d:ac:26:88:d2:fd:6f:e2:5e:61:2d:e6:c1:32:db:
a2:8b:d3:e3:0e:4f:23:a3:f0:bc:cd:30:7a:e0:20:d4:e7:08:
44:7f:a5:af:fe:24:87:c1:94:61:7a:38:05:b4:09:30:04:f9:
da:a4:9e:d2:b7:ee:1b:ce:9b:62:b5:f0:e0:c2:55:52:73:62:
1b:a2:19:99:40:99:90:2b:db:ff:ca:40:a0:09:e2:9d:91:11:
05:81:42:74:ab:b5:cb:60:28:73:36:4b:88:82:68:32:f6:2b:
f0:ff:34:d8:1f:b4:39:87:f1:28:46:88:58:12:95:c3:f2:f4:
bd:54:34:8b:4e:ef:ef:f6:4f:01:8a:fc:99:18:8b:eb:90:ed:
22:65:32:f4:8b:0b:75:07:ef:8a:72:0c:2b:31:bf:85:e8:95:
38:9e:b9:2b:aa:fc:9a:b1:c2:9d:1b:9c:8f:88:16:a1:17:26:
04:c6:b1:74:28:f6:28:21:9d:2f:f4:21:82:03:5e:24:d5:1e:
cb:de:b3:11
-----BEGIN CERTIFICATE-----
MIIDfzCCAmegAwIBAgIJAPz25y8CkXdXMA0GCSqGSIb3DQEBCwUAMFYxCzAJBgNV
BAYTAlVTMREwDwYDVQQIDAhDb2xvcmFkbzELMAkGA1UECgwCSFAxEDAOBgNVBAsM
B01vbmFzY2ExFTATBgNVBAMMDG1vbmFzY2FfdGVzdDAeFw0xNDExMjEyMzUwMjBa
Fw0xNzExMjAyMzUwMjBaMFYxCzAJBgNVBAYTAlVTMREwDwYDVQQIDAhDb2xvcmFk
bzELMAkGA1UECgwCSFAxEDAOBgNVBAsMB01vbmFzY2ExFTATBgNVBAMMDG1vbmFz
Y2FfdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPl7tmdPwTOo
F28BuwyjKrQ2dDeBfGm5HPk3yPUdGEDRs+1LOp8nWJeL+Q1b1SmJUExZyNJYxvbo
NSXXb2L6iuWl/FRjlC9DfoeEtgyQxl7u1J7njFa/sAm840Sp0Gnj+hnkGEX6n9x7
EhBl2Jxt2liXh3liK/ESGRA+tLLhCzQlqIDkO0yoMB6rM45kOXfHlJWmkc+9WiGy
J+dv3R/v1P1MNtQyOsV5Bz7bNU7etREgvyKU1a+snPfFMn83quQNYmfo76A6hlu7
kCLt+aCbOMLH//JE6cRXt/jpsnBCStrMgGGikIYiDV0GENHoPnbBPNXPBsYfpgpf
vZVL9iRQ/2cCAwEAAaNQME4wHQYDVR0OBBYEFOL2Ij2u5wQBC8VLYP6gVHJGmAjD
MB8GA1UdIwQYMBaAFOL2Ij2u5wQBC8VLYP6gVHJGmAjDMAwGA1UdEwQFMAMBAf8w
DQYJKoZIhvcNAQELBQADggEBALeQL7L081ZO2liWXND0YkR6q6Qg22nASG2GUeDF
zZG6xdd57Ft/XVGIfU++m9mAPCq3tlJf/lzGhQ2sJojS/W/iXmEt5sEy26KL0+MO
TyOj8LzNMHrgINTnCER/pa/+JIfBlGF6OAW0CTAE+dqkntK37hvOm2K18ODCVVJz
YhuiGZlAmZAr2//KQKAJ4p2REQWBQnSrtctgKHM2S4iCaDL2K/D/NNgftDmH8ShG
iFgSlcPy9L1UNItO7+/2TwGK/JkYi+uQ7SJlMvSLC3UH74pyDCsxv4XolTieuSuq
/Jqxwp0bnI+IFqEXJgTGsXQo9ighnS/0IYIDXiTVHsvesxE=
-----END CERTIFICATE-----

View File

@ -36,7 +36,6 @@
host: "{{ monasca_api_host }}"
roles:
- {role: cacert, cacert_name: monasca_test_ca.crt, tags: [cacert]}
- {role: monasca-ui, tags: [ui]}
- {role: monasca-keystone, keystone_url: 'http://192.168.10.5:35357/v2.0', tags: [devstack, keystone]} # uses keystone v2 still
- {role: monasca-devstack, tags: [devstack]}

View File

@ -26,7 +26,6 @@
- {role: kafka, kafka_listen_address: "{{mini_mon_host}}", tags: [kafka]}
- {role: influxdb, tags: [influxdb]}
- {role: percona, mysql_root_password: password, percona_package: percona-xtradb-cluster-56, tags: [mysql, percona]}
- {role: cacert, cacert_name: monasca_test_ca.crt, tags: [cacert]}
- name: Sets up schema and Installs Monasca apps
hosts: mini-mon

View File

@ -1,7 +0,0 @@
# cacert
A simple role to copy a cacert into place and make it trusted on debian machines.
Set to variables:
- cert_src - the path to the cert to copy
- cert_name - the name of the cert on the remote system. Note that it must end in a .crt extension.

View File

@ -1,3 +0,0 @@
---
cacert_src: cacert.crt
cacert_name: "{{cacert_src | basename}}"

View File

@ -1,7 +0,0 @@
---
- name: Copy CA cert
copy: src={{cacert_src}} dest=/usr/local/share/ca-certificates/{{cacert_name}}
register: copy
- name: Run update-ca-certificates
command: update-ca-certificates
when: copy | changed