diff --git a/roles/kubernetes-apps/cloud_controller/oci/tasks/main.yml b/roles/kubernetes-apps/cloud_controller/oci/tasks/main.yml index 05d5c6930edaf64f73edb249846a6b6a91808138..2224ae5f1ca5ac367e8ed49d6d0e33c107cc018c 100644 --- a/roles/kubernetes-apps/cloud_controller/oci/tasks/main.yml +++ b/roles/kubernetes-apps/cloud_controller/oci/tasks/main.yml @@ -1,7 +1,6 @@ --- - include: credentials-check.yml - tags: oci - name: "OCI Cloud Controller | Generate Cloud Provider Configuration" template: @@ -9,7 +8,6 @@ dest: "{{ kube_config_dir }}/controller-manager-config.yml" mode: 0644 when: inventory_hostname == groups['kube_control_plane'][0] - tags: oci - name: "OCI Cloud Controller | Slurp Configuration" slurp: @@ -20,7 +18,6 @@ set_fact: controller_manager_config_base64: "{{ controller_manager_config.content }}" when: inventory_hostname == groups['kube_control_plane'][0] - tags: oci - name: "OCI Cloud Controller | Generate Manifests" template: @@ -28,7 +25,6 @@ dest: "{{ kube_config_dir }}/oci-cloud-provider.yml" mode: 0644 when: inventory_hostname == groups['kube_control_plane'][0] - tags: oci - name: "OCI Cloud Controller | Apply Manifests" kube: @@ -36,4 +32,3 @@ filename: "{{ kube_config_dir }}/oci-cloud-provider.yml" state: latest when: inventory_hostname == groups['kube_control_plane'][0] - tags: oci diff --git a/roles/kubernetes-apps/csi_driver/aws_ebs/tasks/main.yml b/roles/kubernetes-apps/csi_driver/aws_ebs/tasks/main.yml index 066009661fffa86eb08e7129844d5cb4004e0bf0..5570dccfdb83415e0ecb5b40fc63214109197694 100644 --- a/roles/kubernetes-apps/csi_driver/aws_ebs/tasks/main.yml +++ b/roles/kubernetes-apps/csi_driver/aws_ebs/tasks/main.yml @@ -11,7 +11,6 @@ - {name: aws-ebs-csi-nodeservice, file: aws-ebs-csi-nodeservice.yml} register: aws_csi_manifests when: inventory_hostname == groups['kube_control_plane'][0] - tags: aws-ebs-csi-driver - name: AWS CSI Driver | Apply Manifests kube: @@ -25,4 +24,3 @@ - not item is skipped loop_control: label: "{{ item.item.file }}" - tags: aws-ebs-csi-driver diff --git a/roles/kubernetes-apps/csi_driver/azuredisk/tasks/main.yml b/roles/kubernetes-apps/csi_driver/azuredisk/tasks/main.yml index 96abe3990412d1df3ba20845b52d937f4127ee02..478e1e71e2d98d8f6d2a29fcfef445e145703fa0 100644 --- a/roles/kubernetes-apps/csi_driver/azuredisk/tasks/main.yml +++ b/roles/kubernetes-apps/csi_driver/azuredisk/tasks/main.yml @@ -1,6 +1,5 @@ --- - include_tasks: azure-credential-check.yml - tags: azure-csi-driver - name: Azure CSI Driver | Write Azure CSI cloud-config template: @@ -9,14 +8,12 @@ group: "{{ kube_cert_group }}" mode: 0640 when: inventory_hostname == groups['kube_control_plane'][0] - tags: azure-csi-driver - name: Azure CSI Driver | Get base64 cloud-config slurp: src: "{{ kube_config_dir }}/azure_csi_cloud_config" register: cloud_config_secret when: inventory_hostname == groups['kube_control_plane'][0] - tags: azure-csi-driver - name: Azure CSI Driver | Generate Manifests template: @@ -32,7 +29,6 @@ - {name: azure-csi-node-info-crd.yml.j2, file: azure-csi-node-info-crd.yml} register: azure_csi_manifests when: inventory_hostname == groups['kube_control_plane'][0] - tags: azure-csi-driver - name: Azure CSI Driver | Apply Manifests kube: @@ -46,4 +42,3 @@ - not item is skipped loop_control: label: "{{ item.item.file }}" - tags: azure-csi-driver diff --git a/roles/kubernetes-apps/csi_driver/cinder/tasks/cinder-write-cacert.yml b/roles/kubernetes-apps/csi_driver/cinder/tasks/cinder-write-cacert.yml index 2e997647c8a3d3a69dc8d14e7521ae72a489e7ea..c6d14a2aa4e2e5ea344b6c090ba95f3541422397 100644 --- a/roles/kubernetes-apps/csi_driver/cinder/tasks/cinder-write-cacert.yml +++ b/roles/kubernetes-apps/csi_driver/cinder/tasks/cinder-write-cacert.yml @@ -8,5 +8,4 @@ dest: "{{ kube_config_dir }}/cinder-cacert.pem" group: "{{ kube_cert_group }}" mode: 0640 - tags: cinder-csi-driver delegate_to: "{{ delegate_host_to_write_cacert }}" diff --git a/roles/kubernetes-apps/csi_driver/cinder/tasks/main.yml b/roles/kubernetes-apps/csi_driver/cinder/tasks/main.yml index 6590f6d0302c2bad9b52420b7ca5080028201324..7d5affe61160490c646e03a7507e9a809bf1986c 100644 --- a/roles/kubernetes-apps/csi_driver/cinder/tasks/main.yml +++ b/roles/kubernetes-apps/csi_driver/cinder/tasks/main.yml @@ -1,6 +1,5 @@ --- - include_tasks: cinder-credential-check.yml - tags: cinder-csi-driver - name: Cinder CSI Driver | Write cacert file include_tasks: cinder-write-cacert.yml @@ -12,7 +11,6 @@ - inventory_hostname in groups['k8s_cluster'] - cinder_cacert is defined - cinder_cacert | length > 0 - tags: cinder-csi-driver - name: Cinder CSI Driver | Write Cinder cloud-config template: @@ -21,14 +19,12 @@ group: "{{ kube_cert_group }}" mode: 0640 when: inventory_hostname == groups['kube_control_plane'][0] - tags: cinder-csi-driver - name: Cinder CSI Driver | Get base64 cloud-config slurp: src: "{{ kube_config_dir }}/cinder_cloud_config" register: cloud_config_secret when: inventory_hostname == groups['kube_control_plane'][0] - tags: cinder-csi-driver - name: Cinder CSI Driver | Generate Manifests template: @@ -45,7 +41,6 @@ - {name: cinder-csi-poddisruptionbudget, file: cinder-csi-poddisruptionbudget.yml} register: cinder_csi_manifests when: inventory_hostname == groups['kube_control_plane'][0] - tags: cinder-csi-driver - name: Cinder CSI Driver | Apply Manifests kube: @@ -59,4 +54,3 @@ - not item is skipped loop_control: label: "{{ item.item.file }}" - tags: cinder-csi-driver diff --git a/roles/kubernetes-apps/csi_driver/csi_crd/tasks/main.yml b/roles/kubernetes-apps/csi_driver/csi_crd/tasks/main.yml index 7329d49e68ebbc462c41deda2badc347b3b8b691..47909312007f76a34690774a30b69038ae625a64 100644 --- a/roles/kubernetes-apps/csi_driver/csi_crd/tasks/main.yml +++ b/roles/kubernetes-apps/csi_driver/csi_crd/tasks/main.yml @@ -10,7 +10,6 @@ - {name: volumesnapshots, file: volumesnapshots.yml} register: csi_crd_manifests when: inventory_hostname == groups['kube_control_plane'][0] - tags: csi-driver - name: CSI CRD | Apply Manifests kube: @@ -25,4 +24,3 @@ - not item is skipped loop_control: label: "{{ item.item.file }}" - tags: csi-driver diff --git a/roles/kubernetes-apps/csi_driver/gcp_pd/tasks/main.yml b/roles/kubernetes-apps/csi_driver/gcp_pd/tasks/main.yml index ebaa86f2bbfba45f4be603c850699b2e76f717f5..59a99f74ed79667d00bc42d1e171d9c7aecf46ee 100644 --- a/roles/kubernetes-apps/csi_driver/gcp_pd/tasks/main.yml +++ b/roles/kubernetes-apps/csi_driver/gcp_pd/tasks/main.yml @@ -3,7 +3,6 @@ fail: msg: "Credentials file cloud-sa.json is mandatory" when: gcp_pd_csi_sa_cred_file is not defined or not gcp_pd_csi_sa_cred_file - tags: gcp-pd-csi-driver - name: GCP PD CSI Driver | Copy GCP credentials file copy: @@ -12,14 +11,12 @@ group: "{{ kube_cert_group }}" mode: 0640 when: inventory_hostname == groups['kube_control_plane'][0] - tags: gcp-pd-csi-driver - name: GCP PD CSI Driver | Get base64 cloud-sa.json slurp: src: "{{ kube_config_dir }}/cloud-sa.json" register: gcp_cred_secret when: inventory_hostname == groups['kube_control_plane'][0] - tags: gcp-pd-csi-driver - name: GCP PD CSI Driver | Generate Manifests template: @@ -33,7 +30,6 @@ - {name: gcp-pd-csi-node, file: gcp-pd-csi-node.yml} register: gcp_pd_csi_manifests when: inventory_hostname == groups['kube_control_plane'][0] - tags: gcp-pd-csi-driver - name: GCP PD CSI Driver | Apply Manifests kube: @@ -47,4 +43,3 @@ - not item is skipped loop_control: label: "{{ item.item.file }}" - tags: gcp-pd-csi-driver diff --git a/roles/kubernetes-apps/csi_driver/upcloud/tasks/main.yml b/roles/kubernetes-apps/csi_driver/upcloud/tasks/main.yml index 01173150300cd13acb832f64bcb932f6f65c4048..63e37bcf5f0cedc24525440310a20fb7a684bce2 100644 --- a/roles/kubernetes-apps/csi_driver/upcloud/tasks/main.yml +++ b/roles/kubernetes-apps/csi_driver/upcloud/tasks/main.yml @@ -3,7 +3,6 @@ fail: msg: "UpCloud username is missing. Env UPCLOUD_USERNAME is mandatory" when: upcloud_username is not defined or not upcloud_username - tags: upcloud-csi-driver - name: UpCloud CSI Driver | Check if UPCLOUD_PASSWORD exists fail: @@ -12,7 +11,6 @@ - upcloud_username is defined - upcloud_username|length > 0 - upcloud_password is not defined or not upcloud_password - tags: upcloud-csi-driver - name: UpCloud CSI Driver | Generate Manifests template: @@ -27,7 +25,6 @@ - {name: upcloud-csi-driver, file: upcloud-csi-driver.yml} register: upcloud_csi_manifests when: inventory_hostname == groups['kube_control_plane'][0] - tags: upcloud-csi-driver - name: UpCloud CSI Driver | Apply Manifests kube: @@ -41,4 +38,3 @@ - not item is skipped loop_control: label: "{{ item.item.file }}" - tags: upcloud-csi-driver diff --git a/roles/kubernetes-apps/csi_driver/vsphere/tasks/main.yml b/roles/kubernetes-apps/csi_driver/vsphere/tasks/main.yml index 7dec480ead3e0e2b4c31b69dc378850fa6cde04d..ea711ebafed7fc962f23638072256546a5ee0cea 100644 --- a/roles/kubernetes-apps/csi_driver/vsphere/tasks/main.yml +++ b/roles/kubernetes-apps/csi_driver/vsphere/tasks/main.yml @@ -1,6 +1,5 @@ --- - include_tasks: vsphere-credentials-check.yml - tags: vsphere-csi-driver - name: vSphere CSI Driver | Generate CSI cloud-config template: @@ -10,7 +9,6 @@ with_items: - vsphere-csi-cloud-config when: inventory_hostname == groups['kube_control_plane'][0] - tags: vsphere-csi-driver - name: vSphere CSI Driver | Generate Manifests template: @@ -27,14 +25,12 @@ - vsphere-csi-node.yml register: vsphere_csi_manifests when: inventory_hostname == groups['kube_control_plane'][0] - tags: vsphere-csi-driver - name: vSphere CSI Driver | Generate a CSI secret manifest command: "{{ kubectl }} create secret generic vsphere-config-secret --from-file=csi-vsphere.conf={{ kube_config_dir }}/vsphere-csi-cloud-config -n kube-system --dry-run --save-config -o yaml" register: vsphere_csi_secret_manifest when: inventory_hostname == groups['kube_control_plane'][0] no_log: true - tags: vsphere-csi-driver - name: vSphere CSI Driver | Apply a CSI secret manifest command: @@ -42,7 +38,6 @@ stdin: "{{ vsphere_csi_secret_manifest.stdout }}" when: inventory_hostname == groups['kube_control_plane'][0] no_log: true - tags: vsphere-csi-driver - name: vSphere CSI Driver | Apply Manifests kube: @@ -56,4 +51,3 @@ - not item is skipped loop_control: label: "{{ item.item }}" - tags: vsphere-csi-driver diff --git a/roles/kubernetes-apps/external_cloud_controller/vsphere/tasks/main.yml b/roles/kubernetes-apps/external_cloud_controller/vsphere/tasks/main.yml index 57fd47e230619a61b5ca1c18b9aa2e2649b664af..9c25c729fedad8387c15814e827110d397f13408 100644 --- a/roles/kubernetes-apps/external_cloud_controller/vsphere/tasks/main.yml +++ b/roles/kubernetes-apps/external_cloud_controller/vsphere/tasks/main.yml @@ -1,6 +1,5 @@ --- - include_tasks: vsphere-credentials-check.yml - tags: external-vsphere - name: External vSphere Cloud Controller | Generate CPI cloud-config template: @@ -10,7 +9,6 @@ with_items: - external-vsphere-cpi-cloud-config when: inventory_hostname == groups['kube_control_plane'][0] - tags: external-vsphere - name: External vSphere Cloud Controller | Generate Manifests template: @@ -24,20 +22,17 @@ - external-vsphere-cloud-controller-manager-ds.yml register: external_vsphere_manifests when: inventory_hostname == groups['kube_control_plane'][0] - tags: external-vsphere - name: External vSphere Cloud Provider Interface | Create a CPI configMap manifest command: "{{ bin_dir }}/kubectl create configmap cloud-config --from-file=vsphere.conf={{ kube_config_dir }}/external-vsphere-cpi-cloud-config -n kube-system --dry-run --save-config -o yaml" register: external_vsphere_configmap_manifest when: inventory_hostname == groups['kube_control_plane'][0] - tags: external-vsphere - name: External vSphere Cloud Provider Interface | Apply a CPI configMap manifest command: cmd: "{{ bin_dir }}/kubectl apply -f -" stdin: "{{ external_vsphere_configmap_manifest.stdout }}" when: inventory_hostname == groups['kube_control_plane'][0] - tags: external-vsphere - name: External vSphere Cloud Controller | Apply Manifests kube: @@ -51,4 +46,3 @@ - not item is skipped loop_control: label: "{{ item.item }}" - tags: external-vsphere