diff --git a/nodepool/elements/nodepool-base/finalise.d/99-unbound b/nodepool/elements/nodepool-base/finalise.d/89-unbound similarity index 73% rename from nodepool/elements/nodepool-base/finalise.d/99-unbound rename to nodepool/elements/nodepool-base/finalise.d/89-unbound index 659972a77c..d931de0676 100755 --- a/nodepool/elements/nodepool-base/finalise.d/99-unbound +++ b/nodepool/elements/nodepool-base/finalise.d/89-unbound @@ -33,16 +33,6 @@ mv /tmp/forwarding.conf /etc/unbound/ chown root:root /etc/unbound/forwarding.conf chmod a+r /etc/unbound/forwarding.conf -# If we have selinux install, restore default SELinux contents when ever -# possible. Currently this only seems relevant for RHEL based DIBs. -SETFILES=$(which setfiles || true) -if [ -e /etc/selinux/targeted/contexts/files/file_contexts -a -x "${SETFILES}" ]; then - # Without fixing selinux file labels, sshd will run in the kernel_t domain - # instead of the sshd_t domain, making ssh connections fail with - # "Unable to get valid context for " error message - setfiles /etc/selinux/targeted/contexts/files/file_contexts /etc/unbound -fi - # Overwrite /etc/resolv.conf at boot dd of=/etc/rc.local <