community.aws.iam_role (5.1.0) — module

Manage AWS IAM roles

| "added in version" 1.0.0 of community.aws"

Authors: Rob White (@wimnat)

Install collection

Install with ansible-galaxy collection install community.aws:==5.1.0


Add to requirements.yml

  collections:
    - name: community.aws
      version: 5.1.0

Description

Manage AWS IAM roles.


Requirements

Usage examples

  • Success
    Steampunk Spotter scan finished with no errors, warnings or hints.
# Note: These examples do not set authentication details, see the AWS Guide for details.

- name: Create a role with description and tags
  community.aws.iam_role:
    name: mynewrole
    assume_role_policy_document: "{{ lookup('file','policy.json') }}"
    description: This is My New Role
    tags:
      env: dev
  • Success
    Steampunk Spotter scan finished with no errors, warnings or hints.
- name: "Create a role and attach a managed policy called 'PowerUserAccess'"
  community.aws.iam_role:
    name: mynewrole
    assume_role_policy_document: "{{ lookup('file','policy.json') }}"
    managed_policies:
      - arn:aws:iam::aws:policy/PowerUserAccess
  • Success
    Steampunk Spotter scan finished with no errors, warnings or hints.
- name: Keep the role created above but remove all managed policies
  community.aws.iam_role:
    name: mynewrole
    assume_role_policy_document: "{{ lookup('file','policy.json') }}"
    managed_policies: []
  • Success
    Steampunk Spotter scan finished with no errors, warnings or hints.
- name: Delete the role
  community.aws.iam_role:
    name: mynewrole
    assume_role_policy_document: "{{ lookup('file', 'policy.json') }}"
    state: absent

Inputs

    
name:
    description:
    - The name of the role to create.
    required: true
    type: str

path:
    default: /
    description:
    - The path to the role. For more information about paths, see U(https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_identifiers.html).
    type: str

tags:
    aliases:
    - resource_tags
    description:
    - A dictionary representing the tags to be applied to the resource.
    - If the I(tags) parameter is not set then tags will not be modified.
    required: false
    type: dict

wait:
    default: true
    description:
    - When I(wait=True) the module will wait for up to I(wait_timeout) seconds for IAM
      role creation before returning.
    type: bool

state:
    choices:
    - present
    - absent
    default: present
    description:
    - Create or remove the IAM role.
    type: str

region:
    aliases:
    - aws_region
    - ec2_region
    description:
    - The AWS region to use.
    - For global services such as IAM, Route53 and CloudFront, I(region) is ignored.
    - The C(AWS_REGION) or C(EC2_REGION) environment variables may also be used.
    - See the Amazon AWS documentation for more information U(http://docs.aws.amazon.com/general/latest/gr/rande.html#ec2_region).
    - The C(ec2_region) alias has been deprecated and will be removed in a release after
      2024-12-01
    - Support for the C(EC2_REGION) environment variable has been deprecated and will
      be removed in a release after 2024-12-01.
    type: str

profile:
    aliases:
    - aws_profile
    description:
    - A named AWS profile to use for authentication.
    - See the AWS documentation for more information about named profiles U(https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-profiles.html).
    - The C(AWS_PROFILE) environment variable may also be used.
    - The I(profile) option is mutually exclusive with the I(aws_access_key), I(aws_secret_key)
      and I(security_token) options.
    type: str

boundary:
    aliases:
    - boundary_policy_arn
    description:
    - The ARN of an IAM managed policy to use to restrict the permissions this role can
      pass on to IAM roles/users that it creates.
    - Boundaries cannot be set on Instance Profiles, as such if this option is specified
      then I(create_instance_profile) must be C(false).
    - This is intended for roles/users that have permissions to create new IAM objects.
    - For more information on boundaries, see U(https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html).
    type: str

access_key:
    aliases:
    - aws_access_key_id
    - aws_access_key
    - ec2_access_key
    description:
    - AWS access key ID.
    - See the AWS documentation for more information about access tokens U(https://docs.aws.amazon.com/general/latest/gr/aws-sec-cred-types.html#access-keys-and-secret-access-keys).
    - The C(AWS_ACCESS_KEY_ID), C(AWS_ACCESS_KEY) or C(EC2_ACCESS_KEY) environment variables
      may also be used in decreasing order of preference.
    - The I(aws_access_key) and I(profile) options are mutually exclusive.
    - The I(aws_access_key_id) alias was added in release 5.1.0 for consistency with the
      AWS botocore SDK.
    - The I(ec2_access_key) alias has been deprecated and will be removed in a release
      after 2024-12-01.
    - Support for the C(EC2_ACCESS_KEY) environment variable has been deprecated and will
      be removed in a release after 2024-12-01.
    type: str

aws_config:
    description:
    - A dictionary to modify the botocore configuration.
    - Parameters can be found in the AWS documentation U(https://botocore.amazonaws.com/v1/documentation/api/latest/reference/config.html#botocore.config.Config).
    type: dict

purge_tags:
    default: true
    description:
    - If I(purge_tags=true) and I(tags) is set, existing tags will be purged from the
      resource to match exactly what is defined by I(tags) parameter.
    - If the I(tags) parameter is not set then tags will not be modified, even if I(purge_tags=True).
    - Tag keys beginning with C(aws:) are reserved by Amazon and can not be modified.  As
      such they will be ignored for the purposes of the I(purge_tags) parameter.  See
      the Amazon documentation for more information U(https://docs.aws.amazon.com/general/latest/gr/aws_tagging.html#tag-conventions).
    required: false
    type: bool

secret_key:
    aliases:
    - aws_secret_access_key
    - aws_secret_key
    - ec2_secret_key
    description:
    - AWS secret access key.
    - See the AWS documentation for more information about access tokens U(https://docs.aws.amazon.com/general/latest/gr/aws-sec-cred-types.html#access-keys-and-secret-access-keys).
    - The C(AWS_SECRET_ACCESS_KEY), C(AWS_SECRET_KEY), or C(EC2_SECRET_KEY) environment
      variables may also be used in decreasing order of preference.
    - The I(secret_key) and I(profile) options are mutually exclusive.
    - The I(aws_secret_access_key) alias was added in release 5.1.0 for consistency with
      the AWS botocore SDK.
    - The I(ec2_secret_key) alias has been deprecated and will be removed in a release
      after 2024-12-01.
    - Support for the C(EC2_SECRET_KEY) environment variable has been deprecated and will
      be removed in a release after 2024-12-01.
    type: str

description:
    description:
    - Provides a description of the role.
    type: str

endpoint_url:
    aliases:
    - ec2_url
    - aws_endpoint_url
    - s3_url
    description:
    - URL to connect to instead of the default AWS endpoints.  While this can be used
      to connection to other AWS-compatible services the amazon.aws and community.aws
      collections are only tested against AWS.
    - The  C(AWS_URL) or C(EC2_URL) environment variables may also be used, in decreasing
      order of preference.
    - The I(ec2_url) and I(s3_url) aliases have been deprecated and will be removed in
      a release after 2024-12-01.
    - Support for the C(EC2_URL) environment variable has been deprecated and will be
      removed in a release after 2024-12-01.
    type: str

wait_timeout:
    default: 120
    description:
    - How long (in seconds) to wait for creation / update to complete.
    type: int

aws_ca_bundle:
    description:
    - The location of a CA Bundle to use when validating SSL certificates.
    - The C(AWS_CA_BUNDLE) environment variable may also be used.
    type: path

session_token:
    aliases:
    - aws_session_token
    - security_token
    - aws_security_token
    - access_token
    description:
    - AWS STS session token for use with temporary credentials.
    - See the AWS documentation for more information about access tokens U(https://docs.aws.amazon.com/general/latest/gr/aws-sec-cred-types.html#access-keys-and-secret-access-keys).
    - The C(AWS_SESSION_TOKEN), C(AWS_SECURITY_TOKEN) or C(EC2_SECURITY_TOKEN) environment
      variables may also be used in decreasing order of preference.
    - The I(security_token) and I(profile) options are mutually exclusive.
    - Aliases I(aws_session_token) and I(session_token) were added in release 3.2.0, with
      the parameter being renamed from I(security_token) to I(session_token) in release
      6.0.0.
    - The I(security_token), I(aws_security_token), and I(access_token) aliases have been
      deprecated and will be removed in a release after 2024-12-01.
    - Support for the C(EC2_SECRET_KEY) and C(AWS_SECURITY_TOKEN) environment variables
      has been deprecated and will be removed in a release after 2024-12-01.
    type: str

purge_policies:
    aliases:
    - purge_policy
    - purge_managed_policies
    description:
    - When I(purge_policies=true) any managed policies not listed in I(managed_policies)
      will be detatched.
    - By default I(purge_policies=true).  In a release after 2022-06-01 this will be changed
      to I(purge_policies=false).
    type: bool

validate_certs:
    default: true
    description:
    - When set to C(false), SSL certificates will not be validated for communication with
      the AWS APIs.
    - Setting I(validate_certs=false) is strongly discouraged, as an alternative, consider
      setting I(aws_ca_bundle) instead.
    type: bool

managed_policies:
    aliases:
    - managed_policy
    description:
    - A list of managed policy ARNs, managed policy ARNs or friendly names.
    - To remove all policies set I(purge_polices=true) and I(managed_policies=[None]).
    - To embed an inline policy, use M(community.aws.iam_policy).
    elements: str
    type: list

max_session_duration:
    description:
    - The maximum duration (in seconds) of a session when assuming the role.
    - Valid values are between 1 and 12 hours (3600 and 43200 seconds).
    type: int

create_instance_profile:
    default: true
    description:
    - Creates an IAM instance profile along with the role.
    type: bool

delete_instance_profile:
    default: false
    description:
    - When I(delete_instance_profile=true) and I(state=absent) deleting a role will also
      delete the instance profile created with the same I(name) as the role.
    - Only applies when I(state=absent).
    type: bool

assume_role_policy_document:
    description:
    - The trust relationship policy document that grants an entity permission to assume
      the role.
    - This parameter is required when I(state=present).
    type: json

debug_botocore_endpoint_logs:
    default: false
    description:
    - Use a C(botocore.endpoint) logger to parse the unique (rather than total) C("resource:action")
      API calls made during a task, outputing the set to the resource_actions key in the
      task results. Use the C(aws_resource_action) callback to output to total list made
      during a playbook.
    - The C(ANSIBLE_DEBUG_BOTOCORE_LOGS) environment variable may also be used.
    type: bool

Outputs

iam_role:
  contains:
    arn:
      description: the Amazon Resource Name (ARN) specifying the role
      returned: always
      sample: arn:aws:iam::1234567890:role/mynewrole
      type: str
    assume_role_policy_document:
      description: the policy that grants an entity permission to assume the role
      returned: always
      sample:
        statement:
        - action: sts:AssumeRole
          effect: Allow
          principal:
            service: ec2.amazonaws.com
          sid: ''
        version: '2012-10-17'
      type: str
    attached_policies:
      description: a list of dicts containing the name and ARN of the managed IAM
        policies attached to the role
      returned: always
      sample:
      - policy_arn: arn:aws:iam::aws:policy/PowerUserAccess
        policy_name: PowerUserAccess
      type: list
    create_date:
      description: the date and time, in ISO 8601 date-time format, when the role
        was created
      returned: always
      sample: '2016-08-14T04:36:28+00:00'
      type: str
    path:
      description: the path to the role
      returned: always
      sample: /
      type: str
    role_id:
      description: the stable and unique string identifying the role
      returned: always
      sample: ABCDEFF4EZ4ABCDEFV4ZC
      type: str
    role_name:
      description: the friendly name that identifies the role
      returned: always
      sample: myrole
      type: str
    tags:
      description: role tags
      returned: always
      sample: '{"Env": "Prod"}'
      type: dict
  description: dictionary containing the IAM Role data
  returned: success
  type: complex