Skip to content
This repository was archived by the owner on Oct 7, 2025. It is now read-only.

Commit 5eeaf74

Browse files
matej5Matej Stajduhar
andauthored
Reverting-changes (#2395)
* Reverting-changes * Updating-iam-tasks * Updating-iam-tasks-2 * Updating-iam-tasks-3 * Updating-iam-tasks-4 * Reverting-meta-tasks --------- Co-authored-by: Matej Stajduhar <[email protected]>
1 parent 1b9138c commit 5eeaf74

File tree

4 files changed

+60
-22
lines changed

4 files changed

+60
-22
lines changed

roles/_meta/aws_region/meta/main.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,4 +8,4 @@ dependencies:
88
- role: aws/aws_cloudwatch_log_group
99
- role: aws/aws_backup
1010
- role: aws/aws_backup_sns
11-
# - role: aws/aws_admin_tools
11+
- role: aws/aws_admin_tools

roles/aws/aws_admin_tools/tasks/lambda_iam.yml

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,11 @@
33
_policies: "{{ item.policies + ['arn:aws:iam::aws:policy/CloudWatchLogsFullAccess'] }}"
44

55
- name: Create a role and attach policies.
6-
amazon.aws.iam_role:
7-
name: "API_{{ item.name }}"
8-
assume_role_policy_document: "{{ lookup('template', 'trusted_entitites.j2') }}"
9-
managed_policies: "{{ _policies }}"
6+
ansible.builtin.include_role:
7+
name: aws/aws_iam_role
8+
vars:
9+
aws_iam_role:
10+
name: "API_{{ item.name }}"
11+
aws_profile: "{{ _aws_profile }}"
12+
managed_policies: "{{ _policies }}"
13+
policy_document: "{{ lookup('template', 'trusted_entitites.j2') }}"

roles/aws/aws_backup_validation/tasks/main.yml

Lines changed: 16 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@
1212
- arn:aws:iam::aws:policy/AmazonRDSFullAccess
1313
- arn:aws:iam::aws:policy/CloudWatchLogsFullAccess
1414
- arn:aws:iam::aws:policy/AmazonSSMFullAccess
15+
- arn:aws:iam::aws:policy/AmazonSESFullAccess
1516
policy_document: "{{ lookup('file', 'trusted_entitites.j2') }}"
1617

1718
- name: Create backup validation Lambda functions.
@@ -34,21 +35,21 @@
3435
# ansible.builtin.set_fact:
3536
# aws_lambda: "{{ aws_lambda | ansible.utils.remove_keys(target=['response_metadata', 'function_file']) }}"
3637

37-
#- name: Create an IAM Managed Policy for passing roles and setup IAM role.
38-
# ansible.builtin.include_role:
39-
# name: aws/aws_iam_role
40-
# vars:
41-
# aws_iam_role:
42-
# name: AWSBackupDefaultServiceRole
43-
# aws_profile: "{{ _aws_profile }}"
44-
# inline_policies:
45-
# name: "PassRole"
46-
# resource: "*"
47-
# action: "iam:PassRole"
48-
# policy_document: "{{ lookup('file', 'pass_role_backup.j2') }}"
49-
# managed_policies:
50-
# - arn:aws:iam::aws:policy/service-role/AWSBackupServiceRolePolicyForBackup
51-
# - arn:aws:iam::aws:policy/service-role/AWSBackupServiceRolePolicyForRestores
38+
- name: Create an IAM Managed Policy for passing roles and setup IAM role.
39+
ansible.builtin.include_role:
40+
name: aws/aws_iam_role
41+
vars:
42+
aws_iam_role:
43+
name: AWSBackupDefaultServiceRole
44+
aws_profile: "{{ _aws_profile }}"
45+
inline_policies:
46+
name: "PassRole"
47+
resource: "*"
48+
action: "iam:PassRole"
49+
policy_document: "{{ lookup('file', 'pass_role_backup.j2') }}"
50+
managed_policies:
51+
- arn:aws:iam::aws:policy/service-role/AWSBackupServiceRolePolicyForBackup
52+
- arn:aws:iam::aws:policy/service-role/AWSBackupServiceRolePolicyForRestores
5253

5354
# TODO: Not all clients have verified identity
5455
#- name: Get verified domain.

roles/aws/aws_iam_role/tasks/main.yml

Lines changed: 35 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,42 @@
1+
- name: Create an IAM Managed Policy if defined.
2+
amazon.aws.iam_managed_policy:
3+
policy_name: "inline_{{ aws_iam_role.name }}_policy"
4+
policy:
5+
Version: "2012-10-17"
6+
Statement:
7+
- Effect: "Allow"
8+
Action: "{{ aws_iam_role.inline_policies.action }}"
9+
Resource: "{{ aws_iam_role.inline_policies.resource }}"
10+
state: present
11+
register: _inline_iam_policy
12+
when: inline_policies.action is defined and inline_policies.action > 0
13+
14+
- name: Join managed and inline policy.
15+
ansible.builtin.set_fact:
16+
_combined_policies: "{{ aws_iam_role.managed_policies + [_inline_iam_policy.arn] }}"
17+
when: inline_policies.action is defined and inline_policies.action > 0
18+
19+
- name: Create combined var if inline policy is not defined or empty.
20+
ansible.builtin.set_fact:
21+
_combined_policies: "{{ aws_iam_role.managed_policies }}"
22+
when: inline_policies.action is not defined or inline_policies.action == 0
23+
24+
- name: Create assume role policy document if predefined string is passed.
25+
ansible.builtin.set_fact:
26+
_assume_role_policy: "{{ lookup('file', aws_iam_role.policy_document + '_document_policy.json') }}"
27+
when: aws_iam_role.policy_document | type_debug == 'AnsibleUnicode'
28+
29+
- name: Create assume role policy document if template is provided.
30+
ansible.builtin.set_fact:
31+
_assume_role_policy: "{{ aws_iam_role.policy_document }}"
32+
when: aws_iam_role.policy_document | type_debug != 'AnsibleUnicode'
33+
134
- name: Create an IAM role.
235
amazon.aws.iam_role:
336
profile: "{{ aws_iam_role.aws_profile }}"
437
name: "{{ aws_iam_role.name }}"
5-
assume_role_policy_document: "{{ lookup('file', aws_iam_role.policy_document + '_document_policy.json') }}"
6-
managed_policies: "{{ aws_iam_role.managed_policies }}"
38+
assume_role_policy_document: "{{ _assume_role_policy }}"
39+
managed_policies: "{{ _combined_policies }}"
740
purge_policies: "{{ aws_iam_role.purge_policies }}"
841
tags: "{{ aws_iam_role.tags }}"
942
create_instance_profile: "{% if aws_iam_role.policy_document == 'ec2' %}true{% else %}false{% endif %}"

0 commit comments

Comments
 (0)