ec2_vpc_nacl and ec2_vpc_nacl_info migrate to AnsibleAWSModule and add tests (#63163)

* Move EC2 networking objects into network-policy.json

* ec2_vpc_nacl: Add integration tests

* ec2_vpc_nacl: Migrate tests to use module_defaults

* ec2_vpc_nacl: (integration tests) Add missing AWS permissions

* ec2_vpc_nacl: (integration tests) Update tests for ipv6 support

* ec2_vpc_nacl: Migrate to AnsibleAWSModule

* Fix sanity tests for ec2_vpc_nacl and ec2_vpc_nacl_info

* ec2_vpc_nacl_info: Migrate to AnsibleAWSModule

* ec2_vpc_nacl_info: (integration tests) Rename from ec2_vpc_nacl_facts to ec2_vpc_nacl_info and add a test using a filter (by tag)

* Pick availability zones dynamically

Rather than assuming that AZa and AZb always exist (they don't), query to find out which AZs we have available first

* Test that the NACLs we get back are actually the *saml* NACL rather than duplicates/delete remove

* Cleanup IPv6 tests a little.

Note: IPv6 support for ec2_vpc_nacl not complete yet.

This provides the initial framework, and should ensure things don't start exploding when support is added.

* Removing subnets by name from a NACL *is* now supported

* Fix ec2_vpc_nacl return documentation
This commit is contained in:
Mark Chappell 2019-10-08 22:27:25 +02:00 committed by Jill R
parent 811127d64d
commit dbc9444572
13 changed files with 1017 additions and 101 deletions

View file

@ -38,61 +38,21 @@
"ec2:*LaunchTemplate", "ec2:*LaunchTemplate",
"ec2:*LaunchTemplateVersion", "ec2:*LaunchTemplateVersion",
"ec2:*LaunchTemplateVersions", "ec2:*LaunchTemplateVersions",
"ec2:AllocateAddress",
"ec2:AssociateAddress",
"ec2:AssociateDhcpOptions",
"ec2:AssociateRouteTable",
"ec2:AssociateVpcCidrBlock",
"ec2:AssociateSubnetCidrBlock",
"ec2:AttachInternetGateway",
"ec2:AttachNetworkInterface",
"ec2:AttachVolume", "ec2:AttachVolume",
"ec2:AttachVpnGateway",
"ec2:CreateCustomerGateway",
"ec2:CreateDhcpOptions",
"ec2:CreateImage", "ec2:CreateImage",
"ec2:CreateInternetGateway",
"ec2:CreateKeyPair", "ec2:CreateKeyPair",
"ec2:CreateNatGateway",
"ec2:CreateNetworkInterface",
"ec2:CreateRoute",
"ec2:CreateRouteTable",
"ec2:CreateSecurityGroup", "ec2:CreateSecurityGroup",
"ec2:CreateSnapshot", "ec2:CreateSnapshot",
"ec2:CreateSubnet",
"ec2:CreateTags", "ec2:CreateTags",
"ec2:CreateVpc",
"ec2:CreateVpnConnection",
"ec2:CreateVpnGateway",
"ec2:DeleteCustomerGateway",
"ec2:DeleteDhcpOptions",
"ec2:DeleteInternetGateway",
"ec2:DeleteKeyPair", "ec2:DeleteKeyPair",
"ec2:DeleteNatGateway",
"ec2:DeleteNetworkInterface",
"ec2:DeleteRoute",
"ec2:DeleteRouteTable",
"ec2:DeleteSnapshot", "ec2:DeleteSnapshot",
"ec2:DeleteSubnet",
"ec2:DeleteTags", "ec2:DeleteTags",
"ec2:DeleteVpc",
"ec2:DeleteVpnConnection",
"ec2:DeleteVpnGateway",
"ec2:DeregisterImage", "ec2:DeregisterImage",
"ec2:DetachInternetGateway",
"ec2:DetachVpnGateway",
"ec2:Describe*", "ec2:Describe*",
"ec2:DisassociateAddress",
"ec2:DisassociateRouteTable",
"ec2:DisassociateSubnetCidrBlock",
"ec2:ImportKeyPair", "ec2:ImportKeyPair",
"ec2:ModifyImageAttribute", "ec2:ModifyImageAttribute",
"ec2:ModifyInstanceAttribute", "ec2:ModifyInstanceAttribute",
"ec2:ModifySubnetAttribute",
"ec2:ModifyVpcAttribute",
"ec2:RegisterImage", "ec2:RegisterImage",
"ec2:ReleaseAddress",
"ec2:ReplaceRouteTableAssociation",
"ec2:ReplaceIamInstanceProfileAssociation", "ec2:ReplaceIamInstanceProfileAssociation",
"ec2:ReportInstanceStatus" "ec2:ReportInstanceStatus"
], ],

View file

@ -23,6 +23,59 @@
], ],
"Resource": "*" "Resource": "*"
}, },
{
"Sid": "AllowUnspecifiedEC2NetworkingResource",
"Effect": "Allow",
"Action": [
"ec2:AllocateAddress",
"ec2:AssociateAddress",
"ec2:AssociateDhcpOptions",
"ec2:AssociateRouteTable",
"ec2:AssociateVpcCidrBlock",
"ec2:AssociateSubnetCidrBlock",
"ec2:AttachInternetGateway",
"ec2:AttachNetworkInterface",
"ec2:AttachVpnGateway",
"ec2:CreateCustomerGateway",
"ec2:CreateDhcpOptions",
"ec2:CreateNatGateway",
"ec2:CreateNetworkAcl",
"ec2:CreateNetworkAclEntry",
"ec2:CreateNetworkInterface",
"ec2:CreateRoute",
"ec2:CreateRouteTable",
"ec2:CreateSubnet",
"ec2:CreateVpc",
"ec2:CreateVpnConnection",
"ec2:CreateVpnGateway",
"ec2:DeleteCustomerGateway",
"ec2:DeleteDhcpOptions",
"ec2:DeleteInternetGateway",
"ec2:DeleteNatGateway",
"ec2:DeleteNetworkAcl",
"ec2:DeleteNetworkAclEntry",
"ec2:DeleteNetworkInterface",
"ec2:DeleteRoute",
"ec2:DeleteRouteTable",
"ec2:DeleteSubnet",
"ec2:DeleteVpc",
"ec2:DeleteVpnConnection",
"ec2:DeleteVpnGateway",
"ec2:DetachInternetGateway",
"ec2:DetachVpnGateway",
"ec2:Describe*",
"ec2:DisassociateAddress",
"ec2:DisassociateRouteTable",
"ec2:DisassociateSubnetCidrBlock",
"ec2:ModifySubnetAttribute",
"ec2:ModifyVpcAttribute",
"ec2:ReleaseAddress",
"ec2:ReplaceNetworkAclAssociation",
"ec2:ReplaceNetworkAclEntry",
"ec2:ReplaceRouteTableAssociation"
],
"Resource": "*"
},
{ {
"Sid": "AllowCloudfrontUsage", "Sid": "AllowCloudfrontUsage",
"Effect": "Allow", "Effect": "Allow",

View file

@ -24,23 +24,27 @@ options:
- Tagged name identifying a network ACL. - Tagged name identifying a network ACL.
- One and only one of the I(name) or I(nacl_id) is required. - One and only one of the I(name) or I(nacl_id) is required.
required: false required: false
type: str
nacl_id: nacl_id:
description: description:
- NACL id identifying a network ACL. - NACL id identifying a network ACL.
- One and only one of the I(name) or I(nacl_id) is required. - One and only one of the I(name) or I(nacl_id) is required.
required: false required: false
version_added: "2.4" version_added: "2.4"
type: str
vpc_id: vpc_id:
description: description:
- VPC id of the requesting VPC. - VPC id of the requesting VPC.
- Required when state present. - Required when state present.
required: false required: false
type: str
subnets: subnets:
description: description:
- The list of subnets that should be associated with the network ACL. - The list of subnets that should be associated with the network ACL.
- Must be specified as a list - Must be specified as a list
- Each subnet can be specified as subnet ID, or its tagged name. - Each subnet can be specified as subnet ID, or its tagged name.
required: false required: false
type: list
egress: egress:
description: description:
- A list of rules for outgoing traffic. Each rule must be specified as a list. - A list of rules for outgoing traffic. Each rule must be specified as a list.
@ -51,6 +55,7 @@ options:
See examples. See examples.
default: [] default: []
required: false required: false
type: list
ingress: ingress:
description: description:
- List of rules for incoming traffic. Each rule must be specified as a list. - List of rules for incoming traffic. Each rule must be specified as a list.
@ -61,15 +66,18 @@ options:
See examples. See examples.
default: [] default: []
required: false required: false
type: list
tags: tags:
description: description:
- Dictionary of tags to look for and apply when creating a network ACL. - Dictionary of tags to look for and apply when creating a network ACL.
required: false required: false
type: dict
state: state:
description: description:
- Creates or modifies an existing NACL - Creates or modifies an existing NACL
- Deletes a NACL and reassociates subnets to the default NACL - Deletes a NACL and reassociates subnets to the default NACL
required: false required: false
type: str
choices: ['present', 'absent'] choices: ['present', 'absent']
default: present default: present
author: Mike Mochan (@mmochan) author: Mike Mochan (@mmochan)
@ -140,19 +148,19 @@ task:
description: The result of the create, or delete action. description: The result of the create, or delete action.
returned: success returned: success
type: dict type: dict
nacl_id:
description: The id of the NACL (when creating or updating an ACL)
returned: success
type: str
sample: acl-123456789abcdef01
''' '''
try: try:
import botocore import botocore
import boto3
HAS_BOTO3 = True
except ImportError: except ImportError:
HAS_BOTO3 = False pass # Handled by AnsibleAWSModule
import traceback
from ansible.module_utils.basic import AnsibleModule
from ansible.module_utils.ec2 import boto3_conn, ec2_argument_spec, get_aws_connection_info
from ansible.module_utils.aws.core import AnsibleAWSModule
# VPC-supported IANA protocol numbers # VPC-supported IANA protocol numbers
# http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml # http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml
@ -379,7 +387,7 @@ def create_network_acl(vpc_id, client, module):
else: else:
nacl = client.create_network_acl(VpcId=vpc_id) nacl = client.create_network_acl(VpcId=vpc_id)
except botocore.exceptions.ClientError as e: except botocore.exceptions.ClientError as e:
module.fail_json(msg=str(e)) module.fail_json_aws(e)
return nacl return nacl
@ -388,7 +396,7 @@ def create_network_acl_entry(params, client, module):
if not module.check_mode: if not module.check_mode:
client.create_network_acl_entry(**params) client.create_network_acl_entry(**params)
except botocore.exceptions.ClientError as e: except botocore.exceptions.ClientError as e:
module.fail_json(msg=str(e)) module.fail_json_aws(e)
def create_tags(nacl_id, client, module): def create_tags(nacl_id, client, module):
@ -397,7 +405,7 @@ def create_tags(nacl_id, client, module):
if not module.check_mode: if not module.check_mode:
client.create_tags(Resources=[nacl_id], Tags=load_tags(module)) client.create_tags(Resources=[nacl_id], Tags=load_tags(module))
except botocore.exceptions.ClientError as e: except botocore.exceptions.ClientError as e:
module.fail_json(msg=str(e)) module.fail_json_aws(e)
def delete_network_acl(nacl_id, client, module): def delete_network_acl(nacl_id, client, module):
@ -405,7 +413,7 @@ def delete_network_acl(nacl_id, client, module):
if not module.check_mode: if not module.check_mode:
client.delete_network_acl(NetworkAclId=nacl_id) client.delete_network_acl(NetworkAclId=nacl_id)
except botocore.exceptions.ClientError as e: except botocore.exceptions.ClientError as e:
module.fail_json(msg=str(e)) module.fail_json_aws(e)
def delete_network_acl_entry(params, client, module): def delete_network_acl_entry(params, client, module):
@ -413,7 +421,7 @@ def delete_network_acl_entry(params, client, module):
if not module.check_mode: if not module.check_mode:
client.delete_network_acl_entry(**params) client.delete_network_acl_entry(**params)
except botocore.exceptions.ClientError as e: except botocore.exceptions.ClientError as e:
module.fail_json(msg=str(e)) module.fail_json_aws(e)
def delete_tags(nacl_id, client, module): def delete_tags(nacl_id, client, module):
@ -421,7 +429,7 @@ def delete_tags(nacl_id, client, module):
if not module.check_mode: if not module.check_mode:
client.delete_tags(Resources=[nacl_id]) client.delete_tags(Resources=[nacl_id])
except botocore.exceptions.ClientError as e: except botocore.exceptions.ClientError as e:
module.fail_json(msg=str(e)) module.fail_json_aws(e)
def describe_acl_associations(subnets, client, module): def describe_acl_associations(subnets, client, module):
@ -432,7 +440,7 @@ def describe_acl_associations(subnets, client, module):
{'Name': 'association.subnet-id', 'Values': subnets} {'Name': 'association.subnet-id', 'Values': subnets}
]) ])
except botocore.exceptions.ClientError as e: except botocore.exceptions.ClientError as e:
module.fail_json(msg=str(e)) module.fail_json_aws(e)
associations = results['NetworkAcls'][0]['Associations'] associations = results['NetworkAcls'][0]['Associations']
return [a['NetworkAclAssociationId'] for a in associations if a['SubnetId'] in subnets] return [a['NetworkAclAssociationId'] for a in associations if a['SubnetId'] in subnets]
@ -448,7 +456,7 @@ def describe_network_acl(client, module):
{'Name': 'tag:Name', 'Values': [module.params.get('name')]} {'Name': 'tag:Name', 'Values': [module.params.get('name')]}
]) ])
except botocore.exceptions.ClientError as e: except botocore.exceptions.ClientError as e:
module.fail_json(msg=str(e)) module.fail_json_aws(e)
return nacl return nacl
@ -456,7 +464,7 @@ def find_acl_by_id(nacl_id, client, module):
try: try:
return client.describe_network_acls(NetworkAclIds=[nacl_id]) return client.describe_network_acls(NetworkAclIds=[nacl_id])
except botocore.exceptions.ClientError as e: except botocore.exceptions.ClientError as e:
module.fail_json(msg=str(e)) module.fail_json_aws(e)
def find_default_vpc_nacl(vpc_id, client, module): def find_default_vpc_nacl(vpc_id, client, module):
@ -464,7 +472,7 @@ def find_default_vpc_nacl(vpc_id, client, module):
response = client.describe_network_acls(Filters=[ response = client.describe_network_acls(Filters=[
{'Name': 'vpc-id', 'Values': [vpc_id]}]) {'Name': 'vpc-id', 'Values': [vpc_id]}])
except botocore.exceptions.ClientError as e: except botocore.exceptions.ClientError as e:
module.fail_json(msg=str(e)) module.fail_json_aws(e)
nacls = response['NetworkAcls'] nacls = response['NetworkAcls']
return [n['NetworkAclId'] for n in nacls if n['IsDefault'] is True] return [n['NetworkAclId'] for n in nacls if n['IsDefault'] is True]
@ -475,7 +483,7 @@ def find_subnet_ids_by_nacl_id(nacl_id, client, module):
{'Name': 'association.network-acl-id', 'Values': [nacl_id]} {'Name': 'association.network-acl-id', 'Values': [nacl_id]}
]) ])
except botocore.exceptions.ClientError as e: except botocore.exceptions.ClientError as e:
module.fail_json(msg=str(e)) module.fail_json_aws(e)
if results['NetworkAcls']: if results['NetworkAcls']:
associations = results['NetworkAcls'][0]['Associations'] associations = results['NetworkAcls'][0]['Associations']
return [s['SubnetId'] for s in associations if s['SubnetId']] return [s['SubnetId'] for s in associations if s['SubnetId']]
@ -492,7 +500,7 @@ def replace_network_acl_association(nacl_id, subnets, client, module):
if not module.check_mode: if not module.check_mode:
client.replace_network_acl_association(**params) client.replace_network_acl_association(**params)
except botocore.exceptions.ClientError as e: except botocore.exceptions.ClientError as e:
module.fail_json(msg=str(e)) module.fail_json_aws(e)
def replace_network_acl_entry(entries, Egress, nacl_id, client, module): def replace_network_acl_entry(entries, Egress, nacl_id, client, module):
@ -503,7 +511,7 @@ def replace_network_acl_entry(entries, Egress, nacl_id, client, module):
if not module.check_mode: if not module.check_mode:
client.replace_network_acl_entry(**params) client.replace_network_acl_entry(**params)
except botocore.exceptions.ClientError as e: except botocore.exceptions.ClientError as e:
module.fail_json(msg=str(e)) module.fail_json_aws(e)
def restore_default_acl_association(params, client, module): def restore_default_acl_association(params, client, module):
@ -511,7 +519,7 @@ def restore_default_acl_association(params, client, module):
if not module.check_mode: if not module.check_mode:
client.replace_network_acl_association(**params) client.replace_network_acl_association(**params)
except botocore.exceptions.ClientError as e: except botocore.exceptions.ClientError as e:
module.fail_json(msg=str(e)) module.fail_json_aws(e)
def subnets_to_associate(nacl, client, module): def subnets_to_associate(nacl, client, module):
@ -525,20 +533,19 @@ def subnets_to_associate(nacl, client, module):
{'Name': 'subnet-id', 'Values': params}]) {'Name': 'subnet-id', 'Values': params}])
all_found.extend(subnets.get('Subnets', [])) all_found.extend(subnets.get('Subnets', []))
except botocore.exceptions.ClientError as e: except botocore.exceptions.ClientError as e:
module.fail_json(msg=str(e), exception=traceback.format_exc()) module.fail_json_aws(e)
if len(params) != len(all_found): if len(params) != len(all_found):
try: try:
subnets = client.describe_subnets(Filters=[ subnets = client.describe_subnets(Filters=[
{'Name': 'tag:Name', 'Values': params}]) {'Name': 'tag:Name', 'Values': params}])
all_found.extend(subnets.get('Subnets', [])) all_found.extend(subnets.get('Subnets', []))
except botocore.exceptions.ClientError as e: except botocore.exceptions.ClientError as e:
module.fail_json(msg=str(e), exception=traceback.format_exc()) module.fail_json_aws(e)
return list(set(s['SubnetId'] for s in all_found if s.get('SubnetId'))) return list(set(s['SubnetId'] for s in all_found if s.get('SubnetId')))
def main(): def main():
argument_spec = ec2_argument_spec() argument_spec = dict(
argument_spec.update(dict(
vpc_id=dict(), vpc_id=dict(),
name=dict(), name=dict(),
nacl_id=dict(), nacl_id=dict(),
@ -547,21 +554,15 @@ def main():
ingress=dict(required=False, type='list', default=list()), ingress=dict(required=False, type='list', default=list()),
egress=dict(required=False, type='list', default=list()), egress=dict(required=False, type='list', default=list()),
state=dict(default='present', choices=['present', 'absent']), state=dict(default='present', choices=['present', 'absent']),
),
) )
module = AnsibleModule(argument_spec=argument_spec, module = AnsibleAWSModule(argument_spec=argument_spec,
supports_check_mode=True, supports_check_mode=True,
required_one_of=[['name', 'nacl_id']], required_one_of=[['name', 'nacl_id']],
required_if=[['state', 'present', ['vpc_id']]]) required_if=[['state', 'present', ['vpc_id']]])
if not HAS_BOTO3:
module.fail_json(msg='json, botocore and boto3 are required.')
state = module.params.get('state').lower() state = module.params.get('state').lower()
try:
region, ec2_url, aws_connect_kwargs = get_aws_connection_info(module, boto3=True) client = module.client('ec2')
client = boto3_conn(module, conn_type='client', resource='ec2', region=region, endpoint=ec2_url, **aws_connect_kwargs)
except botocore.exceptions.NoCredentialsError as e:
module.fail_json(msg="Can't authorize connection - %s" % str(e))
invocations = { invocations = {
"present": setup_network_acl, "present": setup_network_acl,

View file

@ -27,6 +27,7 @@ options:
required: false required: false
default: [] default: []
aliases: [nacl_id] aliases: [nacl_id]
type: list
filters: filters:
description: description:
- A dict of filters to apply. Each dict item consists of a filter key and a filter value. See \ - A dict of filters to apply. Each dict item consists of a filter key and a filter value. See \
@ -34,6 +35,7 @@ options:
names and values are case sensitive. names and values are case sensitive.
required: false required: false
default: {} default: {}
type: dict
notes: notes:
- By default, the module will return all Network ACLs. - By default, the module will return all Network ACLs.
@ -109,10 +111,9 @@ try:
except ImportError: except ImportError:
pass # caught by imported HAS_BOTO3 pass # caught by imported HAS_BOTO3
from ansible.module_utils.aws.core import AnsibleAWSModule
from ansible.module_utils._text import to_native from ansible.module_utils._text import to_native
from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.ec2 import (ansible_dict_to_boto3_filter_list,
from ansible.module_utils.ec2 import (ec2_argument_spec, boto3_conn, get_aws_connection_info,
ansible_dict_to_boto3_filter_list, HAS_BOTO3,
camel_dict_to_snake_dict, boto3_tag_list_to_ansible_dict) camel_dict_to_snake_dict, boto3_tag_list_to_ansible_dict)
@ -132,11 +133,9 @@ def list_ec2_vpc_nacls(connection, module):
try: try:
nacls = connection.describe_network_acls(NetworkAclIds=nacl_ids, Filters=filters) nacls = connection.describe_network_acls(NetworkAclIds=nacl_ids, Filters=filters)
except ClientError as e: except ClientError as e:
module.fail_json(msg="Unable to describe network ACLs {0}: {1}".format(nacl_ids, to_native(e)), module.fail_json_aws(e, msg="Unable to describe network ACLs {0}: {1}".format(nacl_ids, to_native(e)))
exception=traceback.format_exc(), **camel_dict_to_snake_dict(e.response))
except BotoCoreError as e: except BotoCoreError as e:
module.fail_json(msg="Unable to describe network ACLs {0}: {1}".format(nacl_ids, to_native(e)), module.fail_json_aws(e, msg="Unable to describe network ACLs {0}: {1}".format(nacl_ids, to_native(e)))
exception=traceback.format_exc())
# Turn the boto3 result in to ansible_friendly_snaked_names # Turn the boto3 result in to ansible_friendly_snaked_names
snaked_nacls = [] snaked_nacls = []
@ -203,24 +202,15 @@ def nacl_entry_to_list(entry):
def main(): def main():
argument_spec = ec2_argument_spec() argument_spec = dict(
argument_spec.update(
dict(
nacl_ids=dict(default=[], type='list', aliases=['nacl_id']), nacl_ids=dict(default=[], type='list', aliases=['nacl_id']),
filters=dict(default={}, type='dict') filters=dict(default={}, type='dict'))
)
)
module = AnsibleModule(argument_spec=argument_spec, supports_check_mode=True) module = AnsibleAWSModule(argument_spec=argument_spec, supports_check_mode=True)
if module._name == 'ec2_vpc_nacl_facts': if module._name == 'ec2_vpc_nacl_facts':
module.deprecate("The 'ec2_vpc_nacl_facts' module has been renamed to 'ec2_vpc_nacl_info'", version='2.13') module.deprecate("The 'ec2_vpc_nacl_facts' module has been renamed to 'ec2_vpc_nacl_info'", version='2.13')
if not HAS_BOTO3: connection = module.client('ec2')
module.fail_json(msg='boto3 required for this module')
region, ec2_url, aws_connect_params = get_aws_connection_info(module, boto3=True)
connection = boto3_conn(module, conn_type='client', resource='ec2',
region=region, endpoint=ec2_url, **aws_connect_params)
list_ec2_vpc_nacls(connection, module) list_ec2_vpc_nacls(connection, module)

View file

@ -0,0 +1,3 @@
ec2_vpc_nacl_info
cloud/aws
shippable/aws/group2

View file

@ -0,0 +1,3 @@
dependencies:
- prepare_tests
- setup_ec2

View file

@ -0,0 +1,162 @@
# ============================================================
- name: create ingress and egress rules using subnet IDs
ec2_vpc_nacl:
vpc_id: "{{ vpc_id }}"
name: "{{ resource_prefix }}-acl"
subnets: "{{ subnet_ids }}"
tags:
Created_by: "Ansible test {{ resource_prefix }}"
ingress:
- [100, 'tcp', 'allow', '0.0.0.0/0', null, null, 22, 22]
- [200, 'tcp', 'allow', '0.0.0.0/0', null, null, 80, 80]
- [300, 'icmp', 'allow', '0.0.0.0/0', 0, 8]
egress:
- [100, 'all', 'allow', '0.0.0.0/0', null, null, null, null]
state: 'present'
register: nacl
- name: assert the network acl was created
assert:
that:
- nacl.changed
- nacl.nacl_id.startswith('acl-')
- name: get network ACL facts
ec2_vpc_nacl_info:
nacl_ids:
- "{{ nacl.nacl_id }}"
register: nacl_facts
- name: assert the nacl has the correct attributes
assert:
that:
- nacl_facts.nacls | length == 1
- nacl_facts.nacls[0].ingress | length == 3
- nacl_facts.nacls[0].egress | length == 1
# ============================================================
- name: remove an ingress rule
ec2_vpc_nacl:
vpc_id: "{{ vpc_id }}"
name: "{{ resource_prefix }}-acl"
subnets: "{{ subnet_ids }}"
tags:
Created_by: "Ansible test {{ resource_prefix }}"
ingress:
- [100, 'tcp', 'allow', '0.0.0.0/0', null, null, 22, 22]
- [200, 'tcp', 'allow', '0.0.0.0/0', null, null, 80, 80]
egress:
- [100, 'all', 'allow', '0.0.0.0/0', null, null, null, null]
state: 'present'
register: nacl
- name: assert the network acl changed
assert:
that:
- nacl.changed
- nacl.nacl_id.startswith('acl-')
- name: get network ACL facts
ec2_vpc_nacl_info:
nacl_ids:
- "{{ nacl.nacl_id }}"
register: nacl_facts
- name: assert the nacl has the correct attributes
assert:
that:
- nacl_facts.nacls | length == 1
- nacl_facts.nacls[0].ingress | length == 2
- nacl_facts.nacls[0].egress | length == 1
# ============================================================
- name: remove the egress rule
ec2_vpc_nacl:
vpc_id: "{{ vpc_id }}"
name: "{{ resource_prefix }}-acl"
subnets: "{{ subnet_ids }}"
tags:
Created_by: "Ansible test {{ resource_prefix }}"
ingress:
- [100, 'tcp', 'allow', '0.0.0.0/0', null, null, 22, 22]
- [200, 'tcp', 'allow', '0.0.0.0/0', null, null, 80, 80]
egress: []
state: 'present'
register: nacl
- name: assert the network acl changed
assert:
that:
- nacl.changed
- nacl.nacl_id.startswith('acl-')
- name: get network ACL facts
ec2_vpc_nacl_info:
nacl_ids:
- "{{ nacl.nacl_id }}"
register: nacl_facts
- name: assert the nacl has the correct attributes
assert:
that:
- nacl_facts.nacls | length == 1
- nacl_facts.nacls[0].ingress | length == 2
- nacl_facts.nacls[0].egress | length == 0
# ============================================================
- name: add egress rules
ec2_vpc_nacl:
vpc_id: "{{ vpc_id }}"
name: "{{ resource_prefix }}-acl"
subnets: "{{ subnet_ids }}"
tags:
Created_by: "Ansible test {{ resource_prefix }}"
ingress:
- [100, 'tcp', 'allow', '0.0.0.0/0', null, null, 22, 22]
- [200, 'tcp', 'allow', '0.0.0.0/0', null, null, 80, 80]
egress:
- [100, 'tcp', 'allow', '10.0.0.0/24', null, null, 22, 22]
- [200, 'udp', 'allow', '10.0.0.0/24', null, null, 22, 22]
state: 'present'
register: nacl
- name: assert the network acl changed
assert:
that:
- nacl.changed
- nacl.nacl_id.startswith('acl-')
- name: get network ACL facts
ec2_vpc_nacl_info:
nacl_ids:
- "{{ nacl.nacl_id }}"
register: nacl_facts
- name: assert the nacl has the correct attributes
assert:
that:
- nacl_facts.nacls | length == 1
- nacl_facts.nacls[0].ingress | length == 2
- nacl_facts.nacls[0].egress | length == 2
# ============================================================
- name: remove the network ACL
ec2_vpc_nacl:
vpc_id: "{{ vpc_id }}"
name: "{{ resource_prefix }}-acl"
state: absent
register: nacl
until: nacl is success
ignore_errors: yes
retries: 5
delay: 5
- name: assert nacl was removed
assert:
that:
- nacl.changed

View file

@ -0,0 +1,178 @@
- block:
- name: create a VPC
ec2_vpc_net:
cidr_block: 10.230.231.0/24
name: "{{ resource_prefix }}-ipv6"
state: present
ipv6_cidr: yes
register: vpc_result
- set_fact:
vpc_ipv6_cidr: "{{ vpc_result.vpc.ipv6_cidr_block_association_set[0].ipv6_cidr_block }}"
# ============================================================
- name: create subnet with IPv6 (expected changed=true)
ec2_vpc_subnet:
cidr: 10.230.231.0/26
vpc_id: "{{ vpc_result.vpc.id }}"
ipv6_cidr: "{{ vpc_ipv6_cidr | regex_replace('::/56', '::/64') }}"
state: present
tags:
Name: "{{ resource_prefix }}-ipv6-subnet-1"
register: vpc_subnet_ipv6
- name: assert creation with IPv6 happened (expected changed=true)
assert:
that:
- "vpc_subnet_ipv6.subnet.ipv6_cidr_block == '{{ vpc_ipv6_cidr | regex_replace('::/56', '::/64') }}'"
# ============================================================
- name: create ingress and egress rules using subnet names
ec2_vpc_nacl:
vpc_id: "{{ vpc_result.vpc.id }}"
name: "{{ resource_prefix }}-acl"
subnets:
- "{{ resource_prefix }}-ipv6-subnet-1"
tags:
Created_by: "Ansible test {{ resource_prefix }}"
ingress:
- [100, 'tcp', 'allow', '0.0.0.0/0', null, null, 22, 22]
- [200, 'tcp', 'allow', '0.0.0.0/0', null, null, 80, 80]
- [300, 'icmp', 'allow', '0.0.0.0/0', 0, 8]
egress:
- [100, 'all', 'allow', '0.0.0.0/0', null, null, null, null]
state: 'present'
register: nacl
- assert:
that:
- nacl.nacl_id
- set_fact:
nacl_id: "{{ nacl.nacl_id }}"
- name: add ipv6 entries
ec2_vpc_nacl:
vpc_id: "{{ vpc_result.vpc.id }}"
name: "{{ resource_prefix }}-acl"
subnets:
- "{{ resource_prefix }}-ipv6-subnet-1"
tags:
Created_by: "Ansible test {{ resource_prefix }}"
ingress:
- [100, 'tcp', 'allow', '0.0.0.0/0', null, null, 22, 22]
- [200, 'tcp', 'allow', '0.0.0.0/0', null, null, 80, 80]
- [205, 'ipv6-tcp', 'allow', '::/0', null, null, 80, 80]
- [300, 'icmp', 'allow', '0.0.0.0/0', 0, 8]
- [305, 'ipv6-icmp', 'allow', '::/0', 0, 8]
egress:
- [100, 'all', 'allow', '0.0.0.0/0', null, null, null, null]
- [105, 'all', 'allow', '::/0', null, null, null, null]
state: 'present'
register: nacl
# FIXME: Currently IPv6 rules are not supported - uncomment assertion when
# fixed (and add some nacl_info tests)
ignore_errors: yes
- name: get network ACL facts (test that it works with ipv6 entries)
ec2_vpc_nacl_info:
nacl_ids:
- "{{ nacl_id }}"
register: nacl_facts
#- assert:
# that:
# - nacl.changed
# - nacl.nacl_id == nacl_id
- name: purge ingress entries
ec2_vpc_nacl:
vpc_id: "{{ vpc_result.vpc.id }}"
name: "{{ resource_prefix }}-acl"
subnets:
- "{{ resource_prefix }}-ipv6-subnet-1"
tags:
Created_by: "Ansible test {{ resource_prefix }}"
ingress: []
egress:
- [100, 'all', 'allow', '0.0.0.0/0', null, null, null, null]
- [105, 'all', 'allow', '::/0', null, null, null, null]
state: 'present'
register: nacl
# FIXME: Currently IPv6 rules are not supported - uncomment assertion when
# fixed (and add some nacl_info tests)
ignore_errors: yes
#- assert:
# that:
# - nacl.changed
# - nacl.nacl_id == nacl_id
- name: purge egress entries
ec2_vpc_nacl:
vpc_id: "{{ vpc_result.vpc.id }}"
name: "{{ resource_prefix }}-acl"
subnets:
- "{{ resource_prefix }}-ipv6-subnet-1"
tags:
Created_by: "Ansible test {{ resource_prefix }}"
ingress: []
egress: []
state: 'present'
register: nacl
- assert:
that:
- nacl.changed
# ============================================================
- name: remove subnet ipv6 cidr (expected changed=true)
ec2_vpc_subnet:
cidr: 10.230.231.0/26
vpc_id: "{{ vpc_result.vpc.id }}"
state: absent
register: vpc_remove_ipv6_cidr
- name: assert subnet ipv6 cidr removed (expected changed=true)
assert:
that:
- 'vpc_remove_ipv6_cidr.changed'
always:
################################################
# TEARDOWN STARTS HERE
################################################
- name: remove network ACL
ec2_vpc_nacl:
vpc_id: "{{ vpc_result.vpc.id }}"
name: "{{ resource_prefix }}-acl"
state: absent
register: removed_acl
until: removed_acl is success
retries: 5
delay: 5
ignore_errors: yes
- name: tidy up subnet
ec2_vpc_subnet:
cidr: 10.230.231.0/26
vpc_id: "{{ vpc_result.vpc.id }}"
state: absent
register: removed_subnet
until: removed_subnet is success
retries: 5
delay: 5
ignore_errors: yes
- name: tidy up VPC
ec2_vpc_net:
name: "{{ resource_prefix }}-ipv6"
state: absent
cidr_block: 10.230.231.0/24
register: removed_vpc
until: removed_vpc is success
retries: 5
delay: 5
ignore_errors: yes

View file

@ -0,0 +1,170 @@
---
- module_defaults:
group/aws:
aws_access_key: "{{ aws_access_key }}"
aws_secret_key: "{{ aws_secret_key }}"
security_token: "{{ security_token | default(omit) }}"
region: "{{ aws_region }}"
block:
# ============================================================
- name: test without any parameters
ec2_vpc_nacl:
register: result
ignore_errors: yes
- name: assert required parameters
assert:
that:
- result.failed
- "result.msg == 'one of the following is required: name, nacl_id'"
- name: get network ACL info without any parameters
ec2_vpc_nacl_info:
register: nacl_facts
- name: assert we don't error
assert:
that:
- nacl_facts is succeeded
- name: get network ACL info with invalid ID
ec2_vpc_nacl_info:
nacl_ids:
- 'acl-000000000000'
register: nacl_facts
ignore_errors: yes
- name: assert message mentions missing ACLs
assert:
that:
- nacl_facts is failed
- '"does not exist" in nacl_facts.msg'
# ============================================================
- name: fetch AZ availability
aws_az_info:
register: az_info
- name: Assert that we have multiple AZs available to us
assert:
that: az_info.availability_zones | length >= 2
- name: pick AZs
set_fact:
az_one: '{{ az_info.availability_zones[0].zone_name }}'
az_two: '{{ az_info.availability_zones[1].zone_name }}'
# ============================================================
- name: create a VPC
ec2_vpc_net:
cidr_block: 10.230.230.0/24
name: "{{ resource_prefix }}"
state: present
register: vpc
- name: create subnets
ec2_vpc_subnet:
cidr: "{{ item.cidr }}"
az: "{{ item.az }}"
vpc_id: "{{ vpc.vpc.id }}"
state: present
tags:
Name: "{{ item.name }}"
with_items:
- cidr: 10.230.230.0/26
az: "{{ az_one }}"
name: "{{ resource_prefix }}-subnet-1"
- cidr: 10.230.230.64/26
az: "{{ az_two }}"
name: "{{ resource_prefix }}-subnet-2"
- cidr: 10.230.230.128/26
az: "{{ az_one }}"
name: "{{ resource_prefix }}-subnet-3"
- cidr: 10.230.230.192/26
az: "{{ az_two }}"
name: "{{ resource_prefix }}-subnet-4"
register: subnets
# ============================================================
- include_tasks: tasks/subnet_ids.yml
vars:
vpc_id: "{{ vpc.vpc.id }}"
subnet_ids: "{{ subnets | json_query('results[*].subnet.id') }}"
- include_tasks: tasks/subnet_names.yml
vars:
vpc_id: "{{ vpc.vpc.id }}"
subnet_names: "{{ subnets | json_query('results[*].subnet.tags.Name') }}"
- include_tasks: tasks/tags.yml
vars:
vpc_id: "{{ vpc.vpc.id }}"
subnet_ids: "{{ subnets | json_query('results[*].subnet.id') }}"
- include_tasks: tasks/ingress_and_egress.yml
vars:
vpc_id: "{{ vpc.vpc.id }}"
subnet_ids: "{{ subnets | json_query('results[*].subnet.id') }}"
- include_tasks: tasks/ipv6.yml
# ============================================================
always:
- name: remove network ACL
ec2_vpc_nacl:
vpc_id: "{{ vpc.vpc.id }}"
name: "{{ resource_prefix }}-acl"
state: absent
register: removed_acl
until: removed_acl is success
retries: 5
delay: 5
ignore_errors: yes
- name: remove subnets
ec2_vpc_subnet:
cidr: "{{ item.cidr }}"
az: "{{ aws_region}}{{ item.az }}"
vpc_id: "{{ vpc.vpc.id }}"
state: absent
tags:
Public: "{{ item.public | string }}"
Name: "{{ item.public | ternary('public', 'private') }}-{{ item.az }}"
with_items:
- cidr: 10.230.230.0/26
az: "a"
public: "True"
- cidr: 10.230.230.64/26
az: "b"
public: "True"
- cidr: 10.230.230.128/26
az: "a"
public: "False"
- cidr: 10.230.230.192/26
az: "b"
public: "False"
ignore_errors: yes
register: removed_subnets
until: removed_subnets is success
retries: 5
delay: 5
- name: remove the VPC
ec2_vpc_net:
cidr_block: 10.230.230.0/24
name: "{{ resource_prefix }}"
state: absent
ignore_errors: yes
register: removed_vpc
until: removed_vpc is success
retries: 5
delay: 5
# ============================================================

View file

@ -0,0 +1,142 @@
# ============================================================
- name: create ingress and egress rules using subnet IDs
ec2_vpc_nacl:
vpc_id: "{{ vpc_id }}"
name: "{{ resource_prefix }}-acl"
subnets: "{{ subnet_ids }}"
tags:
Created_by: "Ansible test {{ resource_prefix }}"
ingress:
- [100, 'tcp', 'allow', '0.0.0.0/0', null, null, 22, 22]
- [200, 'tcp', 'allow', '0.0.0.0/0', null, null, 80, 80]
- [300, 'icmp', 'allow', '0.0.0.0/0', 0, 8]
egress:
- [100, 'all', 'allow', '0.0.0.0/0', null, null, null, null]
state: 'present'
register: nacl
- set_fact:
nacl_id: "{{ nacl.nacl_id }}"
- name: assert the network acl was created
assert:
that:
- nacl.changed
- nacl.nacl_id.startswith('acl-')
- name: get network ACL facts
ec2_vpc_nacl_info:
nacl_ids:
- "{{ nacl_id }}"
register: nacl_facts
- name: assert the nacl has the correct attributes
assert:
that:
- nacl_facts.nacls | length == 1
- nacl_facts.nacls[0].nacl_id == nacl_id
- nacl_facts.nacls[0].subnets | length == 4
- nacl_facts.nacls[0].subnets | sort == subnet_ids | sort
- nacl_facts.nacls[0].ingress | length == 3
- nacl_facts.nacls[0].egress | length == 1
- "'{{ nacl_facts.nacls[0].tags.Name }}' == '{{ resource_prefix }}-acl'"
# ============================================================
- name: test idempotence
ec2_vpc_nacl:
vpc_id: "{{ vpc_id }}"
name: "{{ resource_prefix }}-acl"
subnets: "{{ subnet_ids }}"
tags:
Created_by: "Ansible test {{ resource_prefix }}"
ingress:
- [100, 'tcp', 'allow', '0.0.0.0/0', null, null, 22, 22]
- [200, 'tcp', 'allow', '0.0.0.0/0', null, null, 80, 80]
- [300, 'icmp', 'allow', '0.0.0.0/0', 0, 8]
egress:
- [100, 'all', 'allow', '0.0.0.0/0', null, null, null, null]
state: 'present'
register: nacl
- name: assert the network acl already existed
assert:
that:
- not nacl.changed
- nacl.nacl_id == nacl_id
- nacl.nacl_id.startswith('acl-')
- name: get network ACL facts
ec2_vpc_nacl_info:
nacl_ids:
- "{{ nacl.nacl_id }}"
register: nacl_facts_idem
- name: assert the facts are the same as before
assert:
that:
- nacl_facts_idem == nacl_facts
# ============================================================
- name: remove a subnet from the network ACL
ec2_vpc_nacl:
vpc_id: "{{ vpc_id }}"
name: "{{ resource_prefix }}-acl"
subnets:
- "{{ subnet_ids[0] }}"
- "{{ subnet_ids[1] }}"
- "{{ subnet_ids[2] }}"
tags:
Created_by: "Ansible test {{ resource_prefix }}"
ingress:
- [100, 'tcp', 'allow', '0.0.0.0/0', null, null, 22, 22]
- [200, 'tcp', 'allow', '0.0.0.0/0', null, null, 80, 80]
- [300, 'icmp', 'allow', '0.0.0.0/0', 0, 8]
egress:
- [100, 'all', 'allow', '0.0.0.0/0', null, null, null, null]
state: 'present'
register: nacl
- name: assert the network ACL changed
assert:
that:
- nacl.changed
- nacl.nacl_id.startswith('acl-')
- nacl.nacl_id == nacl_id
- name: get network ACL facts
ec2_vpc_nacl_info:
nacl_id:
- "{{ nacl.nacl_id }}"
register: nacl_facts
- name: assert the nacl has the correct attributes
assert:
that:
- nacl_facts.nacls | length == 1
- nacl_facts.nacls[0].nacl_id == nacl_id
- nacl_facts.nacls[0].subnets | length == 3
- subnet_ids[3] not in nacl_facts.nacls[0].subnets
- nacl_facts.nacls[0].ingress | length == 3
- nacl_facts.nacls[0].egress | length == 1
- "'{{ nacl_facts.nacls[0].tags.Name }}' == '{{ resource_prefix }}-acl'"
# ============================================================
- name: remove the network ACL
ec2_vpc_nacl:
vpc_id: "{{ vpc_id }}"
name: "{{ resource_prefix }}-acl"
state: absent
register: nacl
until: nacl is success
ignore_errors: yes
retries: 5
delay: 5
- name: assert nacl was removed
assert:
that:
- nacl.changed

View file

@ -0,0 +1,140 @@
# ============================================================
- name: create ingress and egress rules using subnet names
ec2_vpc_nacl:
vpc_id: "{{ vpc_id }}"
name: "{{ resource_prefix }}-acl"
subnets: "{{ subnet_names }}"
tags:
Created_by: "Ansible test {{ resource_prefix }}"
ingress:
- [100, 'tcp', 'allow', '0.0.0.0/0', null, null, 22, 22]
- [200, 'tcp', 'allow', '0.0.0.0/0', null, null, 80, 80]
- [300, 'icmp', 'allow', '0.0.0.0/0', 0, 8]
egress:
- [100, 'all', 'allow', '0.0.0.0/0', null, null, null, null]
state: 'present'
register: nacl
- set_fact:
nacl_id: "{{ nacl.nacl_id }}"
- name: assert the network acl was created
assert:
that:
- nacl.changed
- nacl.nacl_id.startswith('acl-')
- name: get network ACL facts
ec2_vpc_nacl_info:
nacl_ids:
- "{{ nacl_id }}"
register: nacl_facts
- name: assert the nacl has the correct attributes
assert:
that:
- nacl_facts.nacls | length == 1
- nacl_facts.nacls[0].nacl_id == nacl_id
- nacl_facts.nacls[0].subnets | length == 4
- nacl_facts.nacls[0].ingress | length == 3
- nacl_facts.nacls[0].egress | length == 1
- "'{{ nacl_facts.nacls[0].tags.Name }}' == '{{ resource_prefix }}-acl'"
# ============================================================
- name: test idempotence
ec2_vpc_nacl:
vpc_id: "{{ vpc_id }}"
name: "{{ resource_prefix }}-acl"
subnets: "{{ subnet_names }}"
tags:
Created_by: "Ansible test {{ resource_prefix }}"
ingress:
- [100, 'tcp', 'allow', '0.0.0.0/0', null, null, 22, 22]
- [200, 'tcp', 'allow', '0.0.0.0/0', null, null, 80, 80]
- [300, 'icmp', 'allow', '0.0.0.0/0', 0, 8]
egress:
- [100, 'all', 'allow', '0.0.0.0/0', null, null, null, null]
state: 'present'
register: nacl
- name: assert the network acl already existed
assert:
that:
- not nacl.changed
- nacl.nacl_id == nacl_id
- nacl.nacl_id.startswith('acl-')
- name: get network ACL facts
ec2_vpc_nacl_info:
nacl_ids:
- "{{ nacl.nacl_id }}"
register: nacl_facts_idem
- name: assert the facts are the same as before
assert:
that:
- nacl_facts_idem == nacl_facts
# ============================================================
- name: remove a subnet from the network ACL
ec2_vpc_nacl:
vpc_id: "{{ vpc_id }}"
name: "{{ resource_prefix }}-acl"
subnets:
- "{{ subnet_names[0] }}"
- "{{ subnet_names[1] }}"
- "{{ subnet_names[2] }}"
tags:
Created_by: "Ansible test {{ resource_prefix }}"
ingress:
- [100, 'tcp', 'allow', '0.0.0.0/0', null, null, 22, 22]
- [200, 'tcp', 'allow', '0.0.0.0/0', null, null, 80, 80]
- [300, 'icmp', 'allow', '0.0.0.0/0', 0, 8]
egress:
- [100, 'all', 'allow', '0.0.0.0/0', null, null, null, null]
state: 'present'
register: nacl
- name: assert the network ACL changed
assert:
that:
- nacl.changed
- nacl.nacl_id == nacl_id
- nacl.nacl_id.startswith('acl-')
- name: get network ACL facts
ec2_vpc_nacl_info:
nacl_ids:
- "{{ nacl.nacl_id }}"
register: nacl_facts
- name: assert the nacl has the correct attributes
assert:
that:
- nacl_facts.nacls | length == 1
- nacl_facts.nacls[0].nacl_id == nacl_id
- nacl_facts.nacls[0].subnets | length == 3
- nacl_facts.nacls[0].ingress | length == 3
- nacl_facts.nacls[0].egress | length == 1
- "'{{ nacl_facts.nacls[0].tags.Name }}' == '{{ resource_prefix }}-acl'"
# ============================================================
- name: remove the network ACL
ec2_vpc_nacl:
vpc_id: "{{ vpc_id }}"
name: "{{ resource_prefix }}-acl"
state: absent
register: nacl
until: nacl is success
ignore_errors: yes
retries: 5
delay: 5
- name: assert nacl was removed
assert:
that:
- nacl.changed

View file

@ -0,0 +1,117 @@
# ============================================================
- name: create a network ACL using subnet IDs
ec2_vpc_nacl:
vpc_id: "{{ vpc_id }}"
name: "{{ resource_prefix }}-acl"
subnets: "{{ subnet_ids }}"
state: 'present'
register: nacl
- name: assert the network acl was created
assert:
that:
- nacl.changed
- nacl.nacl_id.startswith('acl-')
- name: get network ACL facts
ec2_vpc_nacl_info:
nacl_ids:
- "{{ nacl.nacl_id }}"
register: nacl_facts
- name: assert the nacl has the correct attributes
assert:
that:
- nacl_facts.nacls[0].tags | length == 1
- "'{{ nacl_facts.nacls[0].tags.Name }}' == '{{ resource_prefix }}-acl'"
# ============================================================
- name: add a tag
ec2_vpc_nacl:
vpc_id: "{{ vpc_id }}"
name: "{{ resource_prefix }}-acl"
subnets: "{{ subnet_ids }}"
tags:
Created_by: "Ansible test {{ resource_prefix }}"
state: 'present'
register: nacl
- name: assert the network acl changed
assert:
that:
- nacl.changed
- name: get network ACL facts
ec2_vpc_nacl_info:
nacl_ids:
- "{{ nacl.nacl_id }}"
register: nacl_facts
- name: assert the facts are the same as before
assert:
that:
- nacl_facts.nacls[0].tags | length == 2
- "'{{ nacl_facts.nacls[0].tags.Name }}' == '{{ resource_prefix }}-acl'"
- "'{{ nacl_facts.nacls[0].tags.Created_by }}' == 'Ansible test {{ resource_prefix }}'"
- name: get network ACL facts by filter
ec2_vpc_nacl_info:
filters:
"tag:Created_by": "Ansible test {{ resource_prefix }}"
register: nacl_facts
- name: assert the facts are the same as before
assert:
that:
- nacl_facts.nacls | length == 1
- nacl_facts.nacls[0].tags | length == 2
- "'{{ nacl_facts.nacls[0].tags.Name }}' == '{{ resource_prefix }}-acl'"
- "'{{ nacl_facts.nacls[0].tags.Created_by }}' == 'Ansible test {{ resource_prefix }}'"
# ============================================================
- name: remove a tag
ec2_vpc_nacl:
vpc_id: "{{ vpc_id }}"
name: "{{ resource_prefix }}-acl"
subnets: "{{ subnet_ids }}"
state: 'present'
register: nacl
- name: assert the network acl was created
assert:
that:
- nacl.changed
- nacl.nacl_id.startswith('acl-')
- name: get network ACL facts
ec2_vpc_nacl_info:
nacl_ids:
- "{{ nacl.nacl_id }}"
register: nacl_facts
- name: assert the nacl has the correct attributes
assert:
that:
- nacl_facts.nacls[0].tags | length == 1
- "'{{ nacl_facts.nacls[0].tags.Name }}' == '{{ resource_prefix }}-acl'"
# ============================================================
- name: remove the network ACL
ec2_vpc_nacl:
vpc_id: "{{ vpc_id }}"
name: "{{ resource_prefix }}-acl"
state: absent
register: nacl
until: nacl is success
ignore_errors: yes
retries: 5
delay: 5
- name: assert nacl was removed
assert:
that:
- nacl.changed

View file

@ -818,9 +818,6 @@ lib/ansible/modules/cloud/amazon/ec2_vpc_endpoint_info.py validate-modules:doc-m
lib/ansible/modules/cloud/amazon/ec2_vpc_igw.py validate-modules:parameter-type-not-in-doc lib/ansible/modules/cloud/amazon/ec2_vpc_igw.py validate-modules:parameter-type-not-in-doc
lib/ansible/modules/cloud/amazon/ec2_vpc_igw.py validate-modules:doc-missing-type lib/ansible/modules/cloud/amazon/ec2_vpc_igw.py validate-modules:doc-missing-type
lib/ansible/modules/cloud/amazon/ec2_vpc_igw_info.py validate-modules:parameter-type-not-in-doc lib/ansible/modules/cloud/amazon/ec2_vpc_igw_info.py validate-modules:parameter-type-not-in-doc
lib/ansible/modules/cloud/amazon/ec2_vpc_nacl.py validate-modules:parameter-type-not-in-doc
lib/ansible/modules/cloud/amazon/ec2_vpc_nacl.py validate-modules:doc-missing-type
lib/ansible/modules/cloud/amazon/ec2_vpc_nacl_info.py validate-modules:parameter-type-not-in-doc
lib/ansible/modules/cloud/amazon/ec2_vpc_nat_gateway.py pylint:blacklisted-name lib/ansible/modules/cloud/amazon/ec2_vpc_nat_gateway.py pylint:blacklisted-name
lib/ansible/modules/cloud/amazon/ec2_vpc_nat_gateway.py validate-modules:doc-default-does-not-match-spec lib/ansible/modules/cloud/amazon/ec2_vpc_nat_gateway.py validate-modules:doc-default-does-not-match-spec
lib/ansible/modules/cloud/amazon/ec2_vpc_nat_gateway.py validate-modules:parameter-type-not-in-doc lib/ansible/modules/cloud/amazon/ec2_vpc_nat_gateway.py validate-modules:parameter-type-not-in-doc