Grega Bremec преди 1 месец
родител
ревизия
a88daa67b5
променени са 1 файла, в които са добавени 9 реда и са изтрити 9 реда
  1. 9 9
      playbooks/roles/setup-auth/tasks/main.yml

+ 9 - 9
playbooks/roles/setup-auth/tasks/main.yml

@@ -21,7 +21,7 @@
 #   - admin credentials
 #
 - name: Check that the ingresscontroller's defaultCertificate is set
-  k8s_info:
+  kubernetes.core.k8s_info:
     kubeconfig: tmp/kubeconfig-ocp4
     validate_certs: no
     api_version: operator.openshift.io/v1
@@ -31,7 +31,7 @@
   register: ingress_ca
 
 - name: Get the router's default CA content
-  k8s_info:
+  kubernetes.core.k8s_info:
     kubeconfig: tmp/kubeconfig-ocp4
     validate_certs: no
     api_version: v1
@@ -41,11 +41,11 @@
   register: ingress_ca
 
 - name: Store the CA cert as an actual fact
-  set_fact:
+  ansible.builtin.set_fact:
     ingress_ca: "{{ ingress_ca.resources[0].data['tls.crt'] }}"
 
 - name: Check on oauth/cluster
-  k8s_info:
+  kubernetes.core.k8s_info:
     kubeconfig: tmp/kubeconfig-ocp4
     validate_certs: no
     api_version: config.openshift.io/v1
@@ -53,7 +53,7 @@
     name: cluster
   register: cluster_auth
 
-- assert:
+- ansible.builtin.assert:
     that:
       - (cluster_auth.resources | length) == 1
       - (cluster_auth.resources[0].spec.identityProviders | length) >= 1
@@ -81,7 +81,7 @@
     msg: Using "https://{{ rhbk_fqdn }}" as the hostname.
 
 - name: Make certain router CA CM exists in openshift-config
-  k8s:
+  kubernetes.core.k8s:
     kubeconfig: tmp/kubeconfig-ocp4
     validate_certs: no
     api_version: v1
@@ -96,7 +96,7 @@
         ca.crt: "{{ ingress_ca | string | b64decode }}"
 
 - name: Make certain client secret exists in openshift-config
-  k8s:
+  kubernetes.core.k8s:
     kubeconfig: tmp/kubeconfig-ocp4
     validate_certs: no
     api_version: v1
@@ -112,13 +112,13 @@
         clientSecret: "{{ (rhbk | community.general.json_query('clients[?id==`' + (openshift.rhbk_client_id | default('openshift')) + '`].secret'))[0] | b64encode }}"
 
 - name: Figure out what to do with oauth/cluster - option 1
-  set_fact:
+  ansible.builtin.set_fact:
     oauth_op: add
     oauth_path: /spec/identityProviders/-
   when: (cluster_auth.resources[0].spec.identityProviders | length) == 1
 
 - name: Figure out what to do with oauth/cluster - option 2
-  set_fact:
+  ansible.builtin.set_fact:
     oauth_op: replace
     oauth_path: /spec/identityProviders/1
   when: (cluster_auth.resources[0].spec.identityProviders | length) == 2