community.aws.iam_role (0.1.2) — module

Manage AWS IAM roles

| "added in version" 1.0.0 of community.aws"

Authors: Rob White (@wimnat)

Install collection

Install with ansible-galaxy collection install community.aws:==0.1.2


Add to requirements.yml

  collections:
    - name: community.aws
      version: 0.1.2

Description

Manage AWS IAM roles.


Requirements

Usage examples

  • Success
    Steampunk Spotter scan finished with no errors, warnings or hints.
# Note: These examples do not set authentication details, see the AWS Guide for details.

- name: Create a role with description and tags
  community.aws.iam_role:
    name: mynewrole
    assume_role_policy_document: "{{ lookup('file','policy.json') }}"
    description: This is My New Role
    tags:
      env: dev
  • Success
    Steampunk Spotter scan finished with no errors, warnings or hints.
- name: "Create a role and attach a managed policy called 'PowerUserAccess'"
  community.aws.iam_role:
    name: mynewrole
    assume_role_policy_document: "{{ lookup('file','policy.json') }}"
    managed_policies:
      - arn:aws:iam::aws:policy/PowerUserAccess
  • Success
    Steampunk Spotter scan finished with no errors, warnings or hints.
- name: Keep the role created above but remove all managed policies
  community.aws.iam_role:
    name: mynewrole
    assume_role_policy_document: "{{ lookup('file','policy.json') }}"
    managed_policies: []
  • Success
    Steampunk Spotter scan finished with no errors, warnings or hints.
- name: Delete the role
  community.aws.iam_role:
    name: mynewrole
    assume_role_policy_document: "{{ lookup('file', 'policy.json') }}"
    state: absent

Inputs

    
name:
    description:
    - The name of the role to create.
    required: true
    type: str

path:
    default: /
    description:
    - The path to the role. For more information about paths, see U(https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_identifiers.html).
    type: str

tags:
    description:
    - Tag dict to apply to the queue.
    - Requires botocore 1.12.46 or above.
    type: dict

state:
    choices:
    - present
    - absent
    default: present
    description:
    - Create or remove the IAM role.
    type: str

region:
    aliases:
    - aws_region
    - ec2_region
    description:
    - The AWS region to use. If not specified then the value of the AWS_REGION or EC2_REGION
      environment variable, if any, is used. See U(http://docs.aws.amazon.com/general/latest/gr/rande.html#ec2_region)
    type: str

ec2_url:
    aliases:
    - aws_endpoint_url
    - endpoint_url
    description:
    - URL to use to connect to EC2 or your Eucalyptus cloud (by default the module will
      use EC2 endpoints). Ignored for modules where region is required. Must be specified
      for all other modules if region is not used. If not set then the value of the EC2_URL
      environment variable, if any, is used.
    type: str

profile:
    aliases:
    - aws_profile
    description:
    - Using I(profile) will override I(aws_access_key), I(aws_secret_key) and I(security_token)
      and support for passing them at the same time as I(profile) has been deprecated.
    - I(aws_access_key), I(aws_secret_key) and I(security_token) will be made mutually
      exclusive with I(profile) after 2022-06-01.
    type: str

boundary:
    aliases:
    - boundary_policy_arn
    description:
    - The ARN of an IAM managed policy to use to restrict the permissions this role can
      pass on to IAM roles/users that it creates.
    - Boundaries cannot be set on Instance Profiles, as such if this option is specified
      then I(create_instance_profile) must be C(false).
    - This is intended for roles/users that have permissions to create new IAM objects.
    - For more information on boundaries, see U(https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html).
    - Requires botocore 1.10.57 or above.
    type: str

aws_config:
    description:
    - A dictionary to modify the botocore configuration.
    - Parameters can be found at U(https://botocore.amazonaws.com/v1/documentation/api/latest/reference/config.html#botocore.config.Config).
    - Only the 'user_agent' key is used for boto modules. See U(http://boto.cloudhackers.com/en/latest/boto_config_tut.html#boto)
      for more boto configuration.
    type: dict

purge_tags:
    default: true
    description:
    - Remove tags not listed in I(tags) when tags is specified.
    type: bool

description:
    description:
    - Provides a description of the role.
    type: str

aws_ca_bundle:
    description:
    - The location of a CA Bundle to use when validating SSL certificates.
    - Not used by boto 2 based modules.
    - 'Note: The CA Bundle is read ''module'' side and may need to be explicitly copied
      from the controller if not run locally.'
    type: path

aws_access_key:
    aliases:
    - ec2_access_key
    - access_key
    description:
    - C(AWS access key). If not set then the value of the C(AWS_ACCESS_KEY_ID), C(AWS_ACCESS_KEY)
      or C(EC2_ACCESS_KEY) environment variable is used.
    - If I(profile) is set this parameter is ignored.
    - Passing the I(aws_access_key) and I(profile) options at the same time has been deprecated
      and the options will be made mutually exclusive after 2022-06-01.
    type: str

aws_secret_key:
    aliases:
    - ec2_secret_key
    - secret_key
    description:
    - C(AWS secret key). If not set then the value of the C(AWS_SECRET_ACCESS_KEY), C(AWS_SECRET_KEY),
      or C(EC2_SECRET_KEY) environment variable is used.
    - If I(profile) is set this parameter is ignored.
    - Passing the I(aws_secret_key) and I(profile) options at the same time has been deprecated
      and the options will be made mutually exclusive after 2022-06-01.
    type: str

purge_policies:
    aliases:
    - purge_policy
    - purge_managed_policies
    description:
    - When I(purge_policies=true) any managed policies not listed in I(managed_policies)
      will be detatched.
    - By default I(purge_policies=true).  In Ansible 2.14 this will be changed to I(purge_policies=false).
    type: bool

security_token:
    aliases:
    - aws_security_token
    - access_token
    description:
    - C(AWS STS security token). If not set then the value of the C(AWS_SECURITY_TOKEN)
      or C(EC2_SECURITY_TOKEN) environment variable is used.
    - If I(profile) is set this parameter is ignored.
    - Passing the I(security_token) and I(profile) options at the same time has been deprecated
      and the options will be made mutually exclusive after 2022-06-01.
    type: str

validate_certs:
    default: true
    description:
    - When set to "no", SSL certificates will not be validated for communication with
      the AWS APIs.
    type: bool

managed_policies:
    aliases:
    - managed_policy
    description:
    - A list of managed policy ARNs or, since Ansible 2.4, a list of either managed policy
      ARNs or friendly names.
    - To remove all policies set I(purge_polices=true) and I(managed_policies=[None]).
    - To embed an inline policy, use M(community.aws.iam_policy).
    type: list

max_session_duration:
    description:
    - The maximum duration (in seconds) of a session when assuming the role.
    - Valid values are between 1 and 12 hours (3600 and 43200 seconds).
    type: int

create_instance_profile:
    default: true
    description:
    - Creates an IAM instance profile along with the role.
    type: bool

delete_instance_profile:
    default: false
    description:
    - When I(delete_instance_profile=true) and I(state=absent) deleting a role will also
      delete the instance profile created with the same I(name) as the role.
    - Only applies when I(state=absent).
    type: bool

assume_role_policy_document:
    description:
    - The trust relationship policy document that grants an entity permission to assume
      the role.
    - This parameter is required when I(state=present).
    type: json

debug_botocore_endpoint_logs:
    default: 'no'
    description:
    - Use a botocore.endpoint logger to parse the unique (rather than total) "resource:action"
      API calls made during a task, outputing the set to the resource_actions key in the
      task results. Use the aws_resource_action callback to output to total list made
      during a playbook. The ANSIBLE_DEBUG_BOTOCORE_LOGS environment variable may also
      be used.
    type: bool

Outputs

iam_role:
  contains:
    arn:
      description: the Amazon Resource Name (ARN) specifying the role
      returned: always
      sample: arn:aws:iam::1234567890:role/mynewrole
      type: str
    assume_role_policy_document:
      description: the policy that grants an entity permission to assume the role
      returned: always
      sample:
        statement:
        - action: sts:AssumeRole
          effect: Allow
          principal:
            service: ec2.amazonaws.com
          sid: ''
        version: '2012-10-17'
      type: str
    attached_policies:
      description: a list of dicts containing the name and ARN of the managed IAM
        policies attached to the role
      returned: always
      sample:
      - policy_arn: arn:aws:iam::aws:policy/PowerUserAccess
        policy_name: PowerUserAccess
      type: list
    create_date:
      description: the date and time, in ISO 8601 date-time format, when the role
        was created
      returned: always
      sample: '2016-08-14T04:36:28+00:00'
      type: str
    path:
      description: the path to the role
      returned: always
      sample: /
      type: str
    role_id:
      description: the stable and unique string identifying the role
      returned: always
      sample: ABCDEFF4EZ4ABCDEFV4ZC
      type: str
    role_name:
      description: the friendly name that identifies the role
      returned: always
      sample: myrole
      type: str
    tags:
      description: role tags
      returned: always
      sample: '{"Env": "Prod"}'
      type: dict
  description: dictionary containing the IAM Role data
  returned: success
  type: complex