Skip to content
This repository was archived by the owner on Oct 7, 2025. It is now read-only.

Commit 6ef594d

Browse files
matej5drazenCEMatej Stajduhargregharveyklausi
authored
Fixing aws vpc override pr devel 2.x (#2687)
* Fixing-email-title-for-backup-validation (#2657) Co-authored-by: Matej Stajduhar <[email protected]> * Adding-task-to-create-aurora-cluster (#2659) * Adding-task-to-create-aurora-cluster * Adding-region-profile-and-tags-to-aurora-cluster * Updating-engine-for-aurora-cluster * Updating-parameter-group-engine * Updating-engine-version * Updating-engine-version-2 * Disabling-automated-backups * Disabling-automated-backups-2 * Disabling-automated-backups-3 * Disabling-automated-backups-4 * Skipping-task-if-not-aurora * Adding-subnet-group-to-instances * Adding-subnet-group-to-instances * Updating-SG-return-values * Updating-SG-return-values-2 * Updating-SG-return-values-3 * Updating-SG-return-values-4 * Updating-SG-return-value-debug * Updating-SG-return-value-debug-2 * Updating-SG-return-value-debug-3 * Removing-debug-tasks * Removing-init-var-for-SG-list * Adding-character-set-option --------- Co-authored-by: Matej Stajduhar <[email protected]> * Fixing truthy variable mistakes. (#2662) * Fixing installer variable bug. * Fixing tests for external PRs. * Testing with a fork. * Adding repo owner's username into installer string. * Refactoring config repo detection to simplify. * No longer permitted to use an integer as a truthy value. * No longer permitted to use existence check as a truthy value. * Can't see a reason why linotp var shouldn't be a boolean. * No longer permitted to use existence check as a truthy value. * Fixing truthy errors in ce_deploy role. * No longer permitted to use an integer as a truthy value. * feat(php): Add FPM slow logrotate (#2625) * feat(php): Support removal of APCU, add FPM slow logrotate * simplify condition * revert apcu installed setting, not needed * r73458-install-php-gmp-by-default2 (#2667) * r73458-install-php-gmp-by-default2 * re-add required packages * Wazuh-mitre-report-setup (#2588) * Wazuh-mitre-report-setup * Wazuh-mitre-shellshock-longurl-block * Fixing-vars * Wazuh-mitre-report-setup-PR-2.x * Wazuh mitre report setup pr 2.x (#2669) * Wazuh-mitre-report-setup * Wazuh-mitre-shellshock-longurl-block * Fixing-vars * Wazuh-mitre-report-setup-PR-2.x * Wazuh-mitre-report-setup-PR-2.x * pin_ansible_version (#2671) * pin_ansible_version * pin_ansible_version * pin_ansible_version * pin_ansible_version * pin_ansible_version_fix_upgrade_timer * pin_ansible_version_fix_upgrade_timer * pin_ansible_version_fix_upgrade_timer * pin_ansible_version_disable_upgrade_timer * pin_ansible_version_disable_upgrade_timer * pin_ansible_version_disable_upgrade_timer * pin_ansible_version_disable_upgrade_timer * Fixing-ce-provision-vars (#2678) * Updating-string (#2507) * Updating-string * Updating-string-3 --------- Co-authored-by: Matej Stajduhar <[email protected]> * Added-tasks-to-backup-Aurora-and-copy-AMI-to-safe-region (#2682) * Added-tasks-to-backup-Aurora-and-copy-AMI-to-safe-region * Fixing-aurora-backup-tasks * Fixing-aurora-backup-tasks-2 * Fixing-aurora-backup-tasks-3 * Fixing-aurora-backup-tasks-5 * Adding-aurora-template * Updating-aurora-vars * Adding-handler-to-defaults-for-CF --------- Co-authored-by: Matej Stajduhar <[email protected]> * SG-creation-update (#2605) * SG-creation-update * Updating-lambda-tasks-to-handle-various-file-options * Updating-lambda-tasks-for-url-handling * Updating-aws_admin_tools-for-aws_lambda * Updating-aws_admin_tools-for-aws_lambda * Setting-loop-item * Setting-loop-item-2 * Updating-vpc-sec-group-vars * Removing-extra-vars-for-git-module * Adding-default-for-git_url * Cleaning-up-tasks * Updating-ansible-lint * Updating-ansible-lint * Ommiting-name-if-no-sec_group-name-defined * Removing-loop-var --------- Co-authored-by: Matej Stajduhar <[email protected]> * Fixing-copy-AMI-to-backup-region (#2684) Co-authored-by: Matej Stajduhar <[email protected]> * Fixing-ami-copy-task (#2686) Co-authored-by: Matej Stajduhar <[email protected]> * Fixing-aws_vpc-override * Adding-defaults * Fixing-register-command * Defaulting-tags * Defaulting-tags-2 * Updating-region * Updating-iam_role-vars * Updating-iam_role-vars-2 * Updating-when-statement * Updating-when-statement-for-backups * Updating-when-statement-for-iam-policy * Updating-when-statement-for-iam-policy * Reverting-wazuh-changes * Updating-vars-for-SG-creation * Updating-when-statement-for-iam-role * Updating-handle-git-url * Updating-handle-git-url-2 * Updating-handle-git-url-3 * Updating-handle-git-url-4 * Updating-handle-git-url-5 * Updating-handle-git-url-6 * Updating-handle-git-url-7 * Updating-task * Fixing-tasks --------- Co-authored-by: drazenCE <[email protected]> Co-authored-by: Matej Stajduhar <[email protected]> Co-authored-by: Greg Harvey <[email protected]> Co-authored-by: Klaus Purer <[email protected]> Co-authored-by: nfawbert <[email protected]> Co-authored-by: tymofiisobchenko <[email protected]>
1 parent a92733d commit 6ef594d

File tree

10 files changed

+44
-25
lines changed

10 files changed

+44
-25
lines changed

roles/aws/aws_ami/tasks/repack.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@
1313
name: aws/aws_vpc
1414
tasks_from: security_group
1515
vars:
16-
aws_vpc:
16+
aws_vpc_sg:
1717
profile: "{{ aws_ami.aws_profile }}"
1818
region: "{{ aws_ami.region }}"
1919
name: "{{ aws_ami.repack.cluster_name }}-repacker"

roles/aws/aws_backup/tasks/main.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@
6464
with_items: "{{ aws_backup.plans }}"
6565
loop_control:
6666
loop_var: plan
67-
when: aws_backup.plans | length
67+
when: aws_backup.plans | length > 0
6868

6969
- name: Include aws backup validation role.
7070
ansible.builtin.include_role:

roles/aws/aws_backup_validation/tasks/testing_resources.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@
3434
name: aws/aws_vpc
3535
tasks_from: security_group
3636
vars:
37-
aws_vpc:
37+
aws_vpc_sg:
3838
name: "Restore_testing"
3939
region: "{{ aws_ec2_autoscale_cluster.region }}"
4040
id: "{{ _main_vpc_info.vpcs[0].vpc_id }}"
@@ -55,7 +55,7 @@
5555

5656
- name: Construct AWS instance type dict.
5757
ansible.builtin.set_fact:
58-
_restore_testing_sg: "{{ aws_vpc._result['Restore_testing'] }}"
58+
_restore_testing_sg: "{{ aws_vpc_sg._result['Restore_testing'] }}"
5959

6060
- name: Remove restore testing query file.
6161
ansible.builtin.file:

roles/aws/aws_ec2_autoscale_cluster/tasks/main.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@
5252

5353
- name: Set _aws_ec2_autoscale_cluster_security_group variable.
5454
ansible.builtin.set_fact:
55-
_aws_ec2_autoscale_cluster_security_group: "{{ aws_vpc._result[aws_ec2_autoscale_cluster.name] }}"
55+
_aws_ec2_autoscale_cluster_security_group: "{{ aws_vpc_sg._result[aws_ec2_autoscale_cluster.name] }}"
5656

5757
- name: Reset subnets lists.
5858
ansible.builtin.set_fact:

roles/aws/aws_iam_role/tasks/main.yml

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -21,24 +21,28 @@
2121
_combined_policies: "{{ aws_iam_role.managed_policies }}"
2222
when: aws_iam_role.inline_policies.action is not defined or aws_iam_role.inline_policies.action | length == 0
2323

24+
- name: Create list of strings for predefined policies.
25+
ansible.builtin.set_fact:
26+
allowed_strings: ["ec2", "ecs", "backup"]
27+
2428
- name: Create assume role policy document if predefined string is passed.
2529
ansible.builtin.set_fact:
2630
_assume_role_policy: "{{ lookup('file', aws_iam_role.policy_document + '_document_policy.json') }}"
27-
when: aws_iam_role.policy_document | type_debug == 'AnsibleUnicode'
31+
when: aws_iam_role.policy_document in allowed_strings
2832

2933
- name: Create assume role policy document if template is provided.
3034
ansible.builtin.set_fact:
3135
_assume_role_policy: "{{ aws_iam_role.policy_document }}"
32-
when: aws_iam_role.policy_document | type_debug != 'AnsibleUnicode'
36+
when: aws_iam_role.policy_document not in allowed_strings
3337

3438
- name: Create an IAM role.
3539
amazon.aws.iam_role:
3640
profile: "{{ aws_iam_role.aws_profile }}"
3741
name: "{{ aws_iam_role.name }}"
3842
assume_role_policy_document: "{{ _assume_role_policy }}"
3943
managed_policies: "{{ _combined_policies }}"
40-
purge_policies: "{{ aws_iam_role.purge_policies }}"
41-
tags: "{{ aws_iam_role.tags }}"
44+
purge_policies: "{{ aws_iam_role.purge_policies | default(true) }}"
45+
tags: "{{ aws_iam_role.tags | default({}) }}"
4246
create_instance_profile: "{% if aws_iam_role.policy_document == 'ec2' %}true{% else %}false{% endif %}"
4347
wait: true
4448
register: _aws_iam_role_result

roles/aws/aws_lambda/tasks/handle_url.yml

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,10 +2,14 @@
22
ansible.builtin.git:
33
repo: "{{ aws_lambda.function_file }}"
44
dest: /tmp/funct
5+
update: true
6+
accept_hostkey: true
7+
become: true
8+
become_user: "{{ ce_provision.username }}"
59

610
- name: Find all .j2 template files.
711
ansible.builtin.find:
8-
paths: "{{ work_dir }}/{{ repo_name }}"
12+
paths: "/tmp/funct"
913
patterns: "*.j2"
1014
recurse: true
1115
register: _j2_files
@@ -28,6 +32,11 @@
2832

2933
- name: Copy a zip archive of Lambda function.
3034
community.general.archive:
31-
path: "/tmp/funct"
35+
path: "/tmp/funct/"
3236
dest: "{{ _ce_provision_build_dir }}/{{ aws_lambda.name }}.zip"
3337
format: zip
38+
39+
- name: Remove function directory
40+
ansible.builtin.file:
41+
path: /tmp/funct
42+
state: absent

roles/aws/aws_vpc/defaults/main.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,9 @@
1+
aws_vpc_sg:
2+
aws_profile: "{{ _aws_profile }}"
3+
region: "{{ _aws_region }}"
4+
tags: {}
5+
state: present
6+
description: ""
17
aws_vpc:
28
aws_profile: "{{ _aws_profile }}"
39
region: "{{ _aws_region }}"

roles/aws/aws_vpc/tasks/main.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212
- name: Ensure default Security group is tagged.
1313
ansible.builtin.include_tasks: "security_group.yml"
1414
vars:
15-
aws_vpc:
15+
aws_vpc_sg:
1616
name: "default"
1717
id: "{{ _aws_vpc_vpc.vpc.id }}"
1818
description: "default VPC security group"
Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
- name: Configure vars if looping over list.
22
ansible.builtin.set_fact:
3-
aws_vpc:
3+
aws_vpc_sg:
44
name: "{{ _sec_group.name | default('') }}"
55
tags: "{{ _aws_vpc_vpc.vpc.tags | combine({'Name': _sec_group.name}) }}"
66
id: "{{ _aws_vpc_vpc.vpc.id }}"
@@ -11,18 +11,18 @@
1111

1212
- name: Create Security Group.
1313
amazon.aws.ec2_security_group:
14-
name: "{{ aws_vpc.name }}"
15-
profile: "{{ aws_vpc.aws_profile }}"
16-
region: "{{ aws_vpc.region }}"
17-
tags: "{{ aws_vpc.tags }}"
18-
state: "{{ aws_vpc.state }}"
19-
vpc_id: "{{ aws_vpc.id }}"
20-
description: "{{ aws_vpc.description | default('') }}"
21-
rules: "{{ aws_vpc.rules | default(omit) }}"
22-
rules_egress: "{{ aws_vpc.rules_egress | default(omit) }}"
23-
purge_rules: "{{ aws_vpc.purge_rules | default(omit) }}"
14+
name: "{{ aws_vpc_sg.name }}"
15+
profile: "{{ aws_vpc_sg.aws_profile }}"
16+
region: "{{ aws_vpc_sg.region }}"
17+
tags: "{{ aws_vpc_sg.tags }}"
18+
state: "{{ aws_vpc_sg.state }}"
19+
vpc_id: "{{ aws_vpc_sg.id }}"
20+
description: "{{ aws_vpc_sg.description }}"
21+
rules: "{{ aws_vpc_sg.rules | default(omit) }}"
22+
rules_egress: "{{ aws_vpc_sg.rules_egress | default(omit) }}"
23+
purge_rules: "{{ aws_vpc_sg.purge_rules | default(omit) }}"
2424
register: _aws_vpc_result
2525

2626
- name: Register aws_vpc SG results.
2727
ansible.builtin.set_fact:
28-
aws_vpc: "{{ aws_vpc | combine({'_result': {aws_vpc.name: _aws_vpc_result}}, recursive=True) }}"
28+
aws_vpc_sg: "{{ aws_vpc_sg | combine({'_result': {aws_vpc_sg.name: _aws_vpc_result}}, recursive=True) }}"

roles/aws/aws_vpc_subnet/tasks/subnet.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@
2727
name: aws/aws_vpc
2828
tasks_from: security_group
2929
vars:
30-
aws_vpc:
30+
aws_vpc_sg:
3131
name: "{{ subnet.name }}"
3232
profile: "{{ aws_vpc_subnet.aws_profile }}"
3333
region: "{{ aws_vpc_subnet.region }}"

0 commit comments

Comments
 (0)