2018-04-03 17:39:39 +02:00
|
|
|
- name: set connection information for all tasks
|
|
|
|
set_fact:
|
|
|
|
aws_connection_info: &aws_connection_info
|
|
|
|
aws_access_key: "{{ aws_access_key }}"
|
|
|
|
aws_secret_key: "{{ aws_secret_key }}"
|
|
|
|
security_token: "{{ security_token }}"
|
|
|
|
region: "{{ aws_region }}"
|
|
|
|
no_log: true
|
|
|
|
|
|
|
|
- block:
|
|
|
|
- name: Create IAM role for test
|
|
|
|
iam_role:
|
2019-05-10 20:43:15 +02:00
|
|
|
name: "ansible-test-sts-{{ resource_prefix }}-test-policy"
|
2018-04-03 17:39:39 +02:00
|
|
|
assume_role_policy_document: "{{ lookup('file','assume-role-policy.json') }}"
|
|
|
|
state: present
|
|
|
|
create_instance_profile: yes
|
|
|
|
managed_policy:
|
|
|
|
- AmazonEC2ContainerServiceRole
|
|
|
|
<<: *aws_connection_info
|
|
|
|
register: iam_role
|
|
|
|
|
2018-04-17 21:02:46 +02:00
|
|
|
- name: Create second IAM role for test
|
|
|
|
iam_role:
|
2019-05-10 20:43:15 +02:00
|
|
|
name: "ansible-test-sts-{{ resource_prefix }}-test-policy-2"
|
2018-04-17 21:02:46 +02:00
|
|
|
assume_role_policy_document: "{{ lookup('file','assume-role-policy.json') }}"
|
|
|
|
state: present
|
|
|
|
create_instance_profile: yes
|
|
|
|
managed_policy:
|
|
|
|
- AmazonEC2ContainerServiceRole
|
|
|
|
<<: *aws_connection_info
|
|
|
|
register: iam_role_2
|
|
|
|
|
2018-04-03 17:39:39 +02:00
|
|
|
- name: Make instance with an instance_role
|
|
|
|
ec2_instance:
|
2018-08-30 16:31:05 +02:00
|
|
|
name: "{{ resource_prefix }}-test-instance-role"
|
2018-04-03 17:39:39 +02:00
|
|
|
image_id: "{{ ec2_ami_image[aws_region] }}"
|
|
|
|
security_groups: "{{ sg.group_id }}"
|
|
|
|
instance_type: t2.micro
|
2019-05-10 20:43:15 +02:00
|
|
|
instance_role: "ansible-test-sts-{{ resource_prefix }}-test-policy"
|
2018-04-03 17:39:39 +02:00
|
|
|
<<: *aws_connection_info
|
|
|
|
register: instance_with_role
|
|
|
|
|
|
|
|
- assert:
|
|
|
|
that:
|
|
|
|
- 'instance_with_role.instances[0].iam_instance_profile.arn == iam_role.arn.replace(":role/", ":instance-profile/")'
|
|
|
|
|
2018-10-11 20:21:01 +02:00
|
|
|
- name: Make instance with an instance_role(check mode)
|
|
|
|
ec2_instance:
|
|
|
|
name: "{{ resource_prefix }}-test-instance-role-checkmode"
|
|
|
|
image_id: "{{ ec2_ami_image[aws_region] }}"
|
|
|
|
security_groups: "{{ sg.group_id }}"
|
|
|
|
instance_type: t2.micro
|
2019-06-28 12:28:47 +02:00
|
|
|
instance_role: "{{ iam_role.arn }}"
|
2018-10-11 20:21:01 +02:00
|
|
|
<<: *aws_connection_info
|
|
|
|
check_mode: yes
|
|
|
|
|
|
|
|
- name: "fact presented ec2 instance"
|
2019-06-10 19:33:38 +02:00
|
|
|
ec2_instance_info:
|
2018-10-11 20:21:01 +02:00
|
|
|
filters:
|
|
|
|
"tag:Name": "{{ resource_prefix }}-test-instance-role"
|
|
|
|
<<: *aws_connection_info
|
|
|
|
register: presented_instance_fact
|
|
|
|
|
|
|
|
- name: "fact checkmode ec2 instance"
|
2019-06-10 19:33:38 +02:00
|
|
|
ec2_instance_info:
|
2018-10-11 20:21:01 +02:00
|
|
|
filters:
|
|
|
|
"tag:Name": "{{ resource_prefix }}-test-instance-role-checkmode"
|
|
|
|
<<: *aws_connection_info
|
|
|
|
register: checkmode_instance_fact
|
|
|
|
|
|
|
|
- name: "Confirm whether the check mode is working normally."
|
|
|
|
assert:
|
|
|
|
that:
|
|
|
|
- "{{ presented_instance_fact.instances | length }} > 0"
|
|
|
|
- "{{ checkmode_instance_fact.instances | length }} == 0"
|
|
|
|
|
2018-04-17 21:02:46 +02:00
|
|
|
- name: Update instance with new instance_role
|
|
|
|
ec2_instance:
|
2018-08-30 16:31:05 +02:00
|
|
|
name: "{{ resource_prefix }}-test-instance-role"
|
2018-04-17 21:02:46 +02:00
|
|
|
image_id: "{{ ec2_ami_image[aws_region] }}"
|
|
|
|
security_groups: "{{ sg.group_id }}"
|
|
|
|
instance_type: t2.micro
|
2019-06-28 12:28:47 +02:00
|
|
|
instance_role: "{{ iam_role_2.arn }}"
|
2018-04-17 21:02:46 +02:00
|
|
|
<<: *aws_connection_info
|
|
|
|
register: instance_with_updated_role
|
2019-05-10 20:43:15 +02:00
|
|
|
until: instance_with_updated_role is not failed
|
|
|
|
retries: 10
|
2018-04-17 21:02:46 +02:00
|
|
|
|
|
|
|
- assert:
|
|
|
|
that:
|
|
|
|
- 'instance_with_updated_role.instances[0].iam_instance_profile.arn == iam_role_2.arn.replace(":role/", ":instance-profile/")'
|
|
|
|
- 'instance_with_updated_role.instances[0].instance_id == instance_with_role.instances[0].instance_id'
|
|
|
|
|
2018-04-03 17:39:39 +02:00
|
|
|
always:
|
|
|
|
- name: Terminate instance
|
|
|
|
ec2:
|
|
|
|
instance_ids: "{{ instance_with_role.instance_ids }}"
|
|
|
|
state: absent
|
|
|
|
<<: *aws_connection_info
|
|
|
|
register: removed
|
|
|
|
until: removed is not failed
|
|
|
|
ignore_errors: yes
|
|
|
|
retries: 10
|
|
|
|
|
|
|
|
- name: Delete IAM role for test
|
|
|
|
iam_role:
|
2018-04-17 21:02:46 +02:00
|
|
|
name: "{{ item }}"
|
2018-04-03 17:39:39 +02:00
|
|
|
assume_role_policy_document: "{{ lookup('file','assume-role-policy.json') }}"
|
|
|
|
state: absent
|
|
|
|
create_instance_profile: yes
|
|
|
|
managed_policy:
|
|
|
|
- AmazonEC2ContainerServiceRole
|
|
|
|
<<: *aws_connection_info
|
2018-04-17 21:02:46 +02:00
|
|
|
loop:
|
2019-05-10 20:43:15 +02:00
|
|
|
- "ansible-test-sts-{{ resource_prefix }}-test-policy"
|
|
|
|
- "ansible-test-sts-{{ resource_prefix }}-test-policy-2"
|
2018-04-03 17:39:39 +02:00
|
|
|
register: removed
|
|
|
|
until: removed is not failed
|
|
|
|
ignore_errors: yes
|
|
|
|
retries: 10
|