New module cloudformation_stack_set (#41669)
* [AWS] new module cloudformation_stack_set with integration tests
This commit is contained in:
parent
121551d442
commit
6d52afeed6
8 changed files with 900 additions and 1 deletions
|
@ -69,7 +69,7 @@ from ansible.module_utils._text import to_native
|
||||||
from ansible.module_utils.ec2 import HAS_BOTO3, camel_dict_to_snake_dict, ec2_argument_spec, boto3_conn, get_aws_connection_info
|
from ansible.module_utils.ec2 import HAS_BOTO3, camel_dict_to_snake_dict, ec2_argument_spec, boto3_conn, get_aws_connection_info
|
||||||
|
|
||||||
# We will also export HAS_BOTO3 so end user modules can use it.
|
# We will also export HAS_BOTO3 so end user modules can use it.
|
||||||
__all__ = ('AnsibleAWSModule', 'HAS_BOTO3',)
|
__all__ = ('AnsibleAWSModule', 'HAS_BOTO3', 'is_boto3_error_code')
|
||||||
|
|
||||||
|
|
||||||
class AnsibleAWSModule(object):
|
class AnsibleAWSModule(object):
|
||||||
|
|
672
lib/ansible/modules/cloud/amazon/cloudformation_stack_set.py
Normal file
672
lib/ansible/modules/cloud/amazon/cloudformation_stack_set.py
Normal file
|
@ -0,0 +1,672 @@
|
||||||
|
#!/usr/bin/python
|
||||||
|
# Copyright: (c) 2018, Ansible Project
|
||||||
|
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
|
||||||
|
|
||||||
|
from __future__ import absolute_import, division, print_function
|
||||||
|
__metaclass__ = type
|
||||||
|
|
||||||
|
ANSIBLE_METADATA = {'metadata_version': '1.1',
|
||||||
|
'status': ['preview'],
|
||||||
|
'supported_by': 'community'}
|
||||||
|
|
||||||
|
|
||||||
|
DOCUMENTATION = '''
|
||||||
|
---
|
||||||
|
module: cloudformation_stack_set
|
||||||
|
short_description: Manage groups of CloudFormation stacks
|
||||||
|
description:
|
||||||
|
- Launches/updates/deletes AWS CloudFormation Stack Sets
|
||||||
|
notes:
|
||||||
|
- To make an individual stack, you want the cloudformation module.
|
||||||
|
version_added: "2.7"
|
||||||
|
options:
|
||||||
|
name:
|
||||||
|
description:
|
||||||
|
- name of the cloudformation stack set
|
||||||
|
required: true
|
||||||
|
description:
|
||||||
|
description:
|
||||||
|
- A description of what this stack set creates
|
||||||
|
parameters:
|
||||||
|
description:
|
||||||
|
- A list of hashes of all the template variables for the stack. The value can be a string or a dict.
|
||||||
|
- Dict can be used to set additional template parameter attributes like UsePreviousValue (see example).
|
||||||
|
default: {}
|
||||||
|
state:
|
||||||
|
description:
|
||||||
|
- If state is "present", stack will be created. If state is "present" and if stack exists and template has changed, it will be updated.
|
||||||
|
If state is "absent", stack will be removed.
|
||||||
|
default: present
|
||||||
|
choices: [ present, absent ]
|
||||||
|
template:
|
||||||
|
description:
|
||||||
|
- The local path of the cloudformation template.
|
||||||
|
- This must be the full path to the file, relative to the working directory. If using roles this may look
|
||||||
|
like "roles/cloudformation/files/cloudformation-example.json".
|
||||||
|
- If 'state' is 'present' and the stack does not exist yet, either 'template', 'template_body' or 'template_url'
|
||||||
|
must be specified (but only one of them). If 'state' is present, the stack does exist, and neither 'template',
|
||||||
|
'template_body' nor 'template_url' are specified, the previous template will be reused.
|
||||||
|
template_body:
|
||||||
|
description:
|
||||||
|
- Template body. Use this to pass in the actual body of the Cloudformation template.
|
||||||
|
- If 'state' is 'present' and the stack does not exist yet, either 'template', 'template_body' or 'template_url'
|
||||||
|
must be specified (but only one of them). If 'state' is present, the stack does exist, and neither 'template',
|
||||||
|
'template_body' nor 'template_url' are specified, the previous template will be reused.
|
||||||
|
template_url:
|
||||||
|
description:
|
||||||
|
- Location of file containing the template body. The URL must point to a template (max size 307,200 bytes) located in an S3 bucket in the same region
|
||||||
|
as the stack.
|
||||||
|
- If 'state' is 'present' and the stack does not exist yet, either 'template', 'template_body' or 'template_url'
|
||||||
|
must be specified (but only one of them). If 'state' is present, the stack does exist, and neither 'template',
|
||||||
|
'template_body' nor 'template_url' are specified, the previous template will be reused.
|
||||||
|
purge_stacks:
|
||||||
|
description:
|
||||||
|
- Only applicable when I(state=absent). Sets whether, when deleting a stack set, the stack instances should also be deleted.
|
||||||
|
- By default, instances will be deleted. Set to 'no' or 'false' to keep stacks when stack set is deleted.
|
||||||
|
type: bool
|
||||||
|
default: true
|
||||||
|
wait:
|
||||||
|
description:
|
||||||
|
- Whether or not to wait for stack operation to complete. This includes waiting for stack instances to reach UPDATE_COMPLETE status.
|
||||||
|
- If you choose not to wait, this module will not notify when stack operations fail because it will not wait for them to finish.
|
||||||
|
type: bool
|
||||||
|
default: false
|
||||||
|
wait_timeout:
|
||||||
|
description:
|
||||||
|
- How long to wait (in seconds) for stacks to complete create/update/delete operations.
|
||||||
|
default: 900
|
||||||
|
capabilities:
|
||||||
|
description:
|
||||||
|
- Capabilities allow stacks to create and modify IAM resources, which may include adding users or roles.
|
||||||
|
- Currently the only available values are 'CAPABILITY_IAM' and 'CAPABILITY_NAMED_IAM'. Either or both may be provided.
|
||||||
|
- >
|
||||||
|
The following resources require that one or both of these parameters is specified: AWS::IAM::AccessKey,
|
||||||
|
AWS::IAM::Group, AWS::IAM::InstanceProfile, AWS::IAM::Policy, AWS::IAM::Role, AWS::IAM::User, AWS::IAM::UserToGroupAddition
|
||||||
|
choices:
|
||||||
|
- 'CAPABILITY_IAM'
|
||||||
|
- 'CAPABILITY_NAMED_IAM'
|
||||||
|
regions:
|
||||||
|
description:
|
||||||
|
- A list of AWS regions to create instances of a stack in. The I(region) parameter chooses where the Stack Set is created, and I(regions)
|
||||||
|
specifies the region for stack instances.
|
||||||
|
- At least one region must be specified to create a stack set. On updates, if fewer regions are specified only the specified regions will
|
||||||
|
have their stack instances updated.
|
||||||
|
accounts:
|
||||||
|
description:
|
||||||
|
- A list of AWS accounts in which to create instance of CloudFormation stacks.
|
||||||
|
- At least one region must be specified to create a stack set. On updates, if fewer regions are specified only the specified regions will
|
||||||
|
have their stack instances updated.
|
||||||
|
administration_role_arn:
|
||||||
|
description:
|
||||||
|
- ARN of the administration role, meaning the role that CloudFormation Stack Sets use to assume the roles in your child accounts.
|
||||||
|
- This defaults to I(arn:aws:iam::{{ account ID }}:role/AWSCloudFormationStackSetAdministrationRole) where I({{ account ID }}) is replaced with the
|
||||||
|
account number of the current IAM role/user/STS credentials.
|
||||||
|
aliases:
|
||||||
|
- admin_role_arn
|
||||||
|
- admin_role
|
||||||
|
- administration_role
|
||||||
|
execution_role_name:
|
||||||
|
description:
|
||||||
|
- ARN of the execution role, meaning the role that CloudFormation Stack Sets assumes in your child accounts.
|
||||||
|
- This MUST NOT be an ARN, and the roles must exist in each child account specified.
|
||||||
|
- The default name for the execution role is I(AWSCloudFormationStackSetExecutionRole)
|
||||||
|
aliases:
|
||||||
|
- exec_role_name
|
||||||
|
- exec_role
|
||||||
|
- execution_role
|
||||||
|
tags:
|
||||||
|
description:
|
||||||
|
- Dictionary of tags to associate with stack and its resources during stack creation. Can be updated later, updating tags removes previous entries.
|
||||||
|
failure_tolerance:
|
||||||
|
description:
|
||||||
|
- Settings to change what is considered "failed" when running stack instance updates, and how many to do at a time.
|
||||||
|
|
||||||
|
author: "Ryan Scott Brown (@ryansb)"
|
||||||
|
extends_documentation_fragment:
|
||||||
|
- aws
|
||||||
|
- ec2
|
||||||
|
requirements: [ boto3>=1.6, botocore>=1.10.26 ]
|
||||||
|
'''
|
||||||
|
|
||||||
|
EXAMPLES = '''
|
||||||
|
- name: Create a stack set with instances in two accounts
|
||||||
|
cloudformation_stack_set:
|
||||||
|
name: my-stack
|
||||||
|
description: Test stack in two accounts
|
||||||
|
state: present
|
||||||
|
template_url: https://s3.amazonaws.com/my-bucket/cloudformation.template
|
||||||
|
accounts: [1234567890, 2345678901]
|
||||||
|
regions:
|
||||||
|
- us-east-1
|
||||||
|
|
||||||
|
- name: on subsequent calls, templates are optional but parameters and tags can be altered
|
||||||
|
cloudformation_stack_set:
|
||||||
|
name: my-stack
|
||||||
|
state: present
|
||||||
|
parameters:
|
||||||
|
InstanceName: my_stacked_instance
|
||||||
|
tags:
|
||||||
|
foo: bar
|
||||||
|
test: stack
|
||||||
|
accounts: [1234567890, 2345678901]
|
||||||
|
regions:
|
||||||
|
- us-east-1
|
||||||
|
|
||||||
|
- name: The same type of update, but wait for the update to complete in all stacks
|
||||||
|
cloudformation_stack_set:
|
||||||
|
name: my-stack
|
||||||
|
state: present
|
||||||
|
wait: true
|
||||||
|
parameters:
|
||||||
|
InstanceName: my_restacked_instance
|
||||||
|
tags:
|
||||||
|
foo: bar
|
||||||
|
test: stack
|
||||||
|
accounts: [1234567890, 2345678901]
|
||||||
|
regions:
|
||||||
|
- us-east-1
|
||||||
|
'''
|
||||||
|
|
||||||
|
RETURN = '''
|
||||||
|
operations_log:
|
||||||
|
type: list
|
||||||
|
description: Most recent events in Cloudformation's event log. This may be from a previous run in some cases.
|
||||||
|
returned: always
|
||||||
|
sample:
|
||||||
|
- action: CREATE
|
||||||
|
creation_timestamp: '2018-06-18T17:40:46.372000+00:00'
|
||||||
|
end_timestamp: '2018-06-18T17:41:24.560000+00:00'
|
||||||
|
operation_id: Ansible-StackInstance-Create-0ff2af5b-251d-4fdb-8b89-1ee444eba8b8
|
||||||
|
status: FAILED
|
||||||
|
stack_instances:
|
||||||
|
- account: '1234567890'
|
||||||
|
region: us-east-1
|
||||||
|
stack_set_id: TestStackPrime:19f3f684-aae9-4e67-ba36-e09f92cf5929
|
||||||
|
status: OUTDATED
|
||||||
|
status_reason: Account 1234567890 should have 'AWSCloudFormationStackSetAdministrationRole' role with trust relationship to CloudFormation service.
|
||||||
|
|
||||||
|
operations:
|
||||||
|
description: All operations initiated by this run of the cloudformation_stack_set module
|
||||||
|
returned: always
|
||||||
|
type: list
|
||||||
|
sample:
|
||||||
|
- action: CREATE
|
||||||
|
administration_role_arn: arn:aws:iam::1234567890:role/AWSCloudFormationStackSetAdministrationRole
|
||||||
|
creation_timestamp: '2018-06-18T17:40:46.372000+00:00'
|
||||||
|
end_timestamp: '2018-06-18T17:41:24.560000+00:00'
|
||||||
|
execution_role_name: AWSCloudFormationStackSetExecutionRole
|
||||||
|
operation_id: Ansible-StackInstance-Create-0ff2af5b-251d-4fdb-8b89-1ee444eba8b8
|
||||||
|
operation_preferences:
|
||||||
|
region_order:
|
||||||
|
- us-east-1
|
||||||
|
- us-east-2
|
||||||
|
stack_set_id: TestStackPrime:19f3f684-aae9-4e67-ba36-e09f92cf5929
|
||||||
|
status: FAILED
|
||||||
|
stack_instances:
|
||||||
|
description: CloudFormation stack instances that are members of this stack set. This will also include their region and account ID.
|
||||||
|
returned: state == present
|
||||||
|
type: list
|
||||||
|
sample:
|
||||||
|
- account: '1234567890'
|
||||||
|
region: us-east-1
|
||||||
|
stack_set_id: TestStackPrime:19f3f684-aae9-4e67-ba36-e09f92cf5929
|
||||||
|
status: OUTDATED
|
||||||
|
status_reason: >
|
||||||
|
Account 1234567890 should have 'AWSCloudFormationStackSetAdministrationRole' role with trust relationship to CloudFormation service.
|
||||||
|
- account: '1234567890'
|
||||||
|
region: us-east-2
|
||||||
|
stack_set_id: TestStackPrime:19f3f684-aae9-4e67-ba36-e09f92cf5929
|
||||||
|
status: OUTDATED
|
||||||
|
status_reason: Cancelled since failure tolerance has exceeded
|
||||||
|
stack_set:
|
||||||
|
type: dict
|
||||||
|
description: Facts about the currently deployed stack set, its parameters, and its tags
|
||||||
|
returned: state == present
|
||||||
|
sample:
|
||||||
|
administration_role_arn: arn:aws:iam::1234567890:role/AWSCloudFormationStackSetAdministrationRole
|
||||||
|
capabilities: []
|
||||||
|
description: test stack PRIME
|
||||||
|
execution_role_name: AWSCloudFormationStackSetExecutionRole
|
||||||
|
parameters: []
|
||||||
|
stack_set_arn: arn:aws:cloudformation:us-east-1:1234567890:stackset/TestStackPrime:19f3f684-aae9-467-ba36-e09f92cf5929
|
||||||
|
stack_set_id: TestStackPrime:19f3f684-aae9-4e67-ba36-e09f92cf5929
|
||||||
|
stack_set_name: TestStackPrime
|
||||||
|
status: ACTIVE
|
||||||
|
tags:
|
||||||
|
Some: Thing
|
||||||
|
an: other
|
||||||
|
template_body: |
|
||||||
|
AWSTemplateFormatVersion: "2010-09-09"
|
||||||
|
Parameters: {}
|
||||||
|
Resources:
|
||||||
|
Bukkit:
|
||||||
|
Type: "AWS::S3::Bucket"
|
||||||
|
Properties: {}
|
||||||
|
other:
|
||||||
|
Type: "AWS::SNS::Topic"
|
||||||
|
Properties: {}
|
||||||
|
|
||||||
|
''' # NOQA
|
||||||
|
|
||||||
|
import time
|
||||||
|
import datetime
|
||||||
|
import uuid
|
||||||
|
import itertools
|
||||||
|
|
||||||
|
try:
|
||||||
|
import boto3
|
||||||
|
import botocore.exceptions
|
||||||
|
from botocore.exceptions import ClientError, BotoCoreError
|
||||||
|
except ImportError:
|
||||||
|
# handled by AnsibleAWSModule
|
||||||
|
pass
|
||||||
|
|
||||||
|
from ansible.module_utils.ec2 import AWSRetry, boto3_tag_list_to_ansible_dict, ansible_dict_to_boto3_tag_list, camel_dict_to_snake_dict
|
||||||
|
from ansible.module_utils.aws.core import AnsibleAWSModule, is_boto3_error_code
|
||||||
|
from ansible.module_utils._text import to_native
|
||||||
|
|
||||||
|
|
||||||
|
def create_stack_set(module, stack_params, cfn):
|
||||||
|
try:
|
||||||
|
cfn.create_stack_set(aws_retry=True, **stack_params)
|
||||||
|
return await_stack_set_exists(cfn, stack_params['StackSetName'])
|
||||||
|
except (ClientError, BotoCoreError) as err:
|
||||||
|
module.fail_json_aws(err, msg="Failed to create stack set {0}.".format(stack_params.get('StackSetName')))
|
||||||
|
|
||||||
|
|
||||||
|
def update_stack_set(module, stack_params, cfn):
|
||||||
|
# if the state is present and the stack already exists, we try to update it.
|
||||||
|
# AWS will tell us if the stack template and parameters are the same and
|
||||||
|
# don't need to be updated.
|
||||||
|
try:
|
||||||
|
cfn.update_stack_set(**stack_params)
|
||||||
|
except is_boto3_error_code('StackSetNotFound') as err: # pylint: disable=duplicate-except
|
||||||
|
module.fail_json_aws(err, msg="Failed to find stack set. Check the name & region.")
|
||||||
|
except is_boto3_error_code('StackInstanceNotFound') as err: # pylint: disable=duplicate-except
|
||||||
|
module.fail_json_aws(err, msg="One or more stack instances were not found for this stack set. Double check "
|
||||||
|
"the `accounts` and `regions` parameters.")
|
||||||
|
except is_boto3_error_code('OperationInProgressException') as err: # pylint: disable=duplicate-except
|
||||||
|
module.fail_json_aws(
|
||||||
|
err, msg="Another operation is already in progress on this stack set - please try again later. When making "
|
||||||
|
"multiple cloudformation_stack_set calls, it's best to enable `wait: yes` to avoid unfinished op errors.")
|
||||||
|
except (ClientError, BotoCoreError) as err: # pylint: disable=duplicate-except
|
||||||
|
module.fail_json_aws(err, msg="Could not update stack set.")
|
||||||
|
if module.params.get('wait'):
|
||||||
|
await_stack_set_operation(
|
||||||
|
module, cfn, operation_id=stack_params['OperationId'],
|
||||||
|
stack_set_name=stack_params['StackSetName'],
|
||||||
|
max_wait=module.params.get('wait_timeout'),
|
||||||
|
)
|
||||||
|
|
||||||
|
return True
|
||||||
|
|
||||||
|
|
||||||
|
def compare_stack_instances(cfn, stack_set_name, accounts, regions):
|
||||||
|
instance_list = cfn.list_stack_instances(
|
||||||
|
aws_retry=True,
|
||||||
|
StackSetName=stack_set_name,
|
||||||
|
)['Summaries']
|
||||||
|
desired_stack_instances = set(itertools.product(accounts, regions))
|
||||||
|
existing_stack_instances = set((i['Account'], i['Region']) for i in instance_list)
|
||||||
|
# new stacks, existing stacks, unspecified stacks
|
||||||
|
return (desired_stack_instances - existing_stack_instances), existing_stack_instances, (existing_stack_instances - desired_stack_instances)
|
||||||
|
|
||||||
|
|
||||||
|
@AWSRetry.backoff(tries=3, delay=4)
|
||||||
|
def stack_set_facts(cfn, stack_set_name):
|
||||||
|
try:
|
||||||
|
ss = cfn.describe_stack_set(StackSetName=stack_set_name)['StackSet']
|
||||||
|
ss['Tags'] = boto3_tag_list_to_ansible_dict(ss['Tags'])
|
||||||
|
return ss
|
||||||
|
except cfn.exceptions.from_code('StackSetNotFound'):
|
||||||
|
# catch NotFound error before the retry kicks in to avoid waiting
|
||||||
|
# if the stack does not exist
|
||||||
|
return
|
||||||
|
|
||||||
|
|
||||||
|
def await_stack_set_operation(module, cfn, stack_set_name, operation_id, max_wait):
|
||||||
|
wait_start = datetime.datetime.now()
|
||||||
|
operation = None
|
||||||
|
for i in range(max_wait // 15):
|
||||||
|
try:
|
||||||
|
operation = cfn.describe_stack_set_operation(StackSetName=stack_set_name, OperationId=operation_id)
|
||||||
|
if operation['StackSetOperation']['Status'] not in ('RUNNING', 'STOPPING'):
|
||||||
|
# Stack set has completed operation
|
||||||
|
break
|
||||||
|
except is_boto3_error_code('StackSetNotFound'): # pylint: disable=duplicate-except
|
||||||
|
pass
|
||||||
|
except is_boto3_error_code('OperationNotFound'): # pylint: disable=duplicate-except
|
||||||
|
pass
|
||||||
|
time.sleep(15)
|
||||||
|
|
||||||
|
if operation and operation['StackSetOperation']['Status'] not in ('FAILED', 'STOPPED'):
|
||||||
|
await_stack_instance_completion(
|
||||||
|
module, cfn,
|
||||||
|
stack_set_name=stack_set_name,
|
||||||
|
# subtract however long we waited already
|
||||||
|
max_wait=int(max_wait - (datetime.datetime.now() - wait_start).total_seconds()),
|
||||||
|
)
|
||||||
|
elif operation and operation['StackSetOperation']['Status'] in ('FAILED', 'STOPPED'):
|
||||||
|
pass
|
||||||
|
else:
|
||||||
|
module.warn(
|
||||||
|
"Timed out waiting for operation {0} on stack set {1} after {2} seconds. Returning unfinished operation".format(
|
||||||
|
operation_id, stack_set_name, max_wait
|
||||||
|
)
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def await_stack_instance_completion(module, cfn, stack_set_name, max_wait):
|
||||||
|
to_await = None
|
||||||
|
for i in range(max_wait // 15):
|
||||||
|
try:
|
||||||
|
stack_instances = cfn.list_stack_instances(StackSetName=stack_set_name)
|
||||||
|
to_await = [inst for inst in stack_instances['Summaries']
|
||||||
|
if inst['Status'] != 'CURRENT']
|
||||||
|
if not to_await:
|
||||||
|
return stack_instances['Summaries']
|
||||||
|
except is_boto3_error_code('StackSetNotFound'): # pylint: disable=duplicate-except
|
||||||
|
# this means the deletion beat us, or the stack set is not yet propagated
|
||||||
|
pass
|
||||||
|
time.sleep(15)
|
||||||
|
|
||||||
|
module.warn(
|
||||||
|
"Timed out waiting for stack set {0} instances {1} to complete after {2} seconds. Returning unfinished operation".format(
|
||||||
|
stack_set_name, ', '.join(s['StackId'] for s in to_await), max_wait
|
||||||
|
)
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def await_stack_set_exists(cfn, stack_set_name):
|
||||||
|
# AWSRetry will retry on `NotFound` errors for us
|
||||||
|
ss = cfn.describe_stack_set(StackSetName=stack_set_name, aws_retry=True)['StackSet']
|
||||||
|
ss['Tags'] = boto3_tag_list_to_ansible_dict(ss['Tags'])
|
||||||
|
return camel_dict_to_snake_dict(ss, ignore_list=('Tags',))
|
||||||
|
|
||||||
|
|
||||||
|
def describe_stack_tree(module, stack_set_name, operation_ids=None):
|
||||||
|
cfn = module.client('cloudformation', retry_decorator=AWSRetry.jittered_backoff(retries=5, delay=3, max_delay=5))
|
||||||
|
result = dict()
|
||||||
|
result['stack_set'] = camel_dict_to_snake_dict(
|
||||||
|
cfn.describe_stack_set(
|
||||||
|
StackSetName=stack_set_name,
|
||||||
|
aws_retry=True,
|
||||||
|
)['StackSet']
|
||||||
|
)
|
||||||
|
result['stack_set']['tags'] = boto3_tag_list_to_ansible_dict(result['stack_set']['tags'])
|
||||||
|
result['operations_log'] = sorted(
|
||||||
|
camel_dict_to_snake_dict(
|
||||||
|
cfn.list_stack_set_operations(
|
||||||
|
StackSetName=stack_set_name,
|
||||||
|
aws_retry=True,
|
||||||
|
)
|
||||||
|
)['summaries'],
|
||||||
|
key=lambda x: x['creation_timestamp']
|
||||||
|
)
|
||||||
|
result['stack_instances'] = sorted(
|
||||||
|
[
|
||||||
|
camel_dict_to_snake_dict(i) for i in
|
||||||
|
cfn.list_stack_instances(StackSetName=stack_set_name)['Summaries']
|
||||||
|
],
|
||||||
|
key=lambda i: i['region'] + i['account']
|
||||||
|
)
|
||||||
|
|
||||||
|
if operation_ids:
|
||||||
|
result['operations'] = []
|
||||||
|
for op_id in operation_ids:
|
||||||
|
try:
|
||||||
|
result['operations'].append(camel_dict_to_snake_dict(
|
||||||
|
cfn.describe_stack_set_operation(
|
||||||
|
StackSetName=stack_set_name,
|
||||||
|
OperationId=op_id,
|
||||||
|
)['StackSetOperation']
|
||||||
|
))
|
||||||
|
except is_boto3_error_code('OperationNotFoundException'): # pylint: disable=duplicate-except
|
||||||
|
pass
|
||||||
|
return result
|
||||||
|
|
||||||
|
|
||||||
|
def get_operation_preferences(module):
|
||||||
|
params = dict()
|
||||||
|
if module.params.get('regions'):
|
||||||
|
params['RegionOrder'] = list(module.params['regions'])
|
||||||
|
for param, api_name in {
|
||||||
|
'fail_count': 'FailureToleranceCount',
|
||||||
|
'fail_percentage': 'FailureTolerancePercentage',
|
||||||
|
'parallel_percentage': 'MaxConcurrentPercentage',
|
||||||
|
'parallel_count': 'MaxConcurrentCount',
|
||||||
|
}.items():
|
||||||
|
if module.params.get('failure_tolerance', {}).get(param):
|
||||||
|
params[api_name] = module.params.get('failure_tolerance', {}).get(param)
|
||||||
|
return params
|
||||||
|
|
||||||
|
|
||||||
|
def main():
|
||||||
|
argument_spec = dict(
|
||||||
|
name=dict(required=True),
|
||||||
|
description=dict(),
|
||||||
|
wait=dict(type='bool', default=False),
|
||||||
|
wait_timeout=dict(type='int', default=900),
|
||||||
|
state=dict(default='present', choices=['present', 'absent']),
|
||||||
|
purge_stacks=dict(type='bool', default=True),
|
||||||
|
parameters=dict(type='dict', default={}),
|
||||||
|
template=dict(type='path'),
|
||||||
|
template_url=dict(),
|
||||||
|
template_body=dict(),
|
||||||
|
capabilities=dict(type='list', choices=['CAPABILITY_IAM', 'CAPABILITY_NAMED_IAM']),
|
||||||
|
regions=dict(type='list'),
|
||||||
|
accounts=dict(type='list'),
|
||||||
|
failure_tolerance=dict(
|
||||||
|
type='dict',
|
||||||
|
default={},
|
||||||
|
options=dict(
|
||||||
|
fail_count=dict(type='int'),
|
||||||
|
fail_percentage=dict(type='int'),
|
||||||
|
parallel_percentage=dict(type='int'),
|
||||||
|
parallel_count=dict(type='int'),
|
||||||
|
),
|
||||||
|
mutually_exclusive=[
|
||||||
|
['fail_count', 'fail_percentage'],
|
||||||
|
['parallel_count', 'parallel_percentage'],
|
||||||
|
],
|
||||||
|
),
|
||||||
|
administration_role_arn=dict(aliases=['admin_role_arn', 'administration_role', 'admin_role']),
|
||||||
|
execution_role_name=dict(aliases=['execution_role', 'exec_role', 'exec_role_name']),
|
||||||
|
tags=dict(type='dict'),
|
||||||
|
)
|
||||||
|
|
||||||
|
module = AnsibleAWSModule(
|
||||||
|
argument_spec=argument_spec,
|
||||||
|
mutually_exclusive=[['template_url', 'template', 'template_body']],
|
||||||
|
supports_check_mode=True
|
||||||
|
)
|
||||||
|
if not (module.boto3_at_least('1.6.0') and module.botocore_at_least('1.10.26')):
|
||||||
|
module.fail_json(msg="Boto3 or botocore version is too low. This module requires at least boto3 1.6 and botocore 1.10.26")
|
||||||
|
|
||||||
|
# Wrap the cloudformation client methods that this module uses with
|
||||||
|
# automatic backoff / retry for throttling error codes
|
||||||
|
cfn = module.client('cloudformation', retry_decorator=AWSRetry.jittered_backoff(retries=10, delay=3, max_delay=30))
|
||||||
|
existing_stack_set = stack_set_facts(cfn, module.params['name'])
|
||||||
|
|
||||||
|
operation_uuid = to_native(uuid.uuid4())
|
||||||
|
operation_ids = []
|
||||||
|
# collect the parameters that are passed to boto3. Keeps us from having so many scalars floating around.
|
||||||
|
stack_params = {}
|
||||||
|
state = module.params['state']
|
||||||
|
if state == 'present' and not module.params['accounts']:
|
||||||
|
module.fail_json(
|
||||||
|
msg="Can't create a stack set without choosing at least one account. "
|
||||||
|
"To get the ID of the current account, use the aws_caller_facts module."
|
||||||
|
)
|
||||||
|
|
||||||
|
module.params['accounts'] = [to_native(a) for a in module.params['accounts']]
|
||||||
|
|
||||||
|
stack_params['StackSetName'] = module.params['name']
|
||||||
|
if module.params.get('description'):
|
||||||
|
stack_params['Description'] = module.params['description']
|
||||||
|
|
||||||
|
if module.params.get('capabilities'):
|
||||||
|
stack_params['Capabilities'] = module.params['capabilities']
|
||||||
|
|
||||||
|
if module.params['template'] is not None:
|
||||||
|
with open(module.params['template'], 'r') as tpl:
|
||||||
|
stack_params['TemplateBody'] = tpl.read()
|
||||||
|
elif module.params['template_body'] is not None:
|
||||||
|
stack_params['TemplateBody'] = module.params['template_body']
|
||||||
|
elif module.params['template_url'] is not None:
|
||||||
|
stack_params['TemplateURL'] = module.params['template_url']
|
||||||
|
else:
|
||||||
|
# no template is provided, but if the stack set exists already, we can use the existing one.
|
||||||
|
if existing_stack_set:
|
||||||
|
stack_params['UsePreviousTemplate'] = True
|
||||||
|
else:
|
||||||
|
module.fail_json(
|
||||||
|
msg="The Stack Set {0} does not exist, and no template was provided. Provide one of `template`, "
|
||||||
|
"`template_body`, or `template_url`".format(module.params['name'])
|
||||||
|
)
|
||||||
|
|
||||||
|
stack_params['Parameters'] = []
|
||||||
|
for k, v in module.params['parameters'].items():
|
||||||
|
if isinstance(v, dict):
|
||||||
|
# set parameter based on a dict to allow additional CFN Parameter Attributes
|
||||||
|
param = dict(ParameterKey=k)
|
||||||
|
|
||||||
|
if 'value' in v:
|
||||||
|
param['ParameterValue'] = to_native(v['value'])
|
||||||
|
|
||||||
|
if 'use_previous_value' in v and bool(v['use_previous_value']):
|
||||||
|
param['UsePreviousValue'] = True
|
||||||
|
param.pop('ParameterValue', None)
|
||||||
|
|
||||||
|
stack_params['Parameters'].append(param)
|
||||||
|
else:
|
||||||
|
# allow default k/v configuration to set a template parameter
|
||||||
|
stack_params['Parameters'].append({'ParameterKey': k, 'ParameterValue': str(v)})
|
||||||
|
|
||||||
|
if module.params.get('tags') and isinstance(module.params.get('tags'), dict):
|
||||||
|
stack_params['Tags'] = ansible_dict_to_boto3_tag_list(module.params['tags'])
|
||||||
|
|
||||||
|
if module.params.get('administration_role_arn'):
|
||||||
|
# TODO loosen the semantics here to autodetect the account ID and build the ARN
|
||||||
|
stack_params['AdministrationRoleARN'] = module.params['administration_role_arn']
|
||||||
|
if module.params.get('execution_role_name'):
|
||||||
|
stack_params['ExecutionRoleName'] = module.params['execution_role_name']
|
||||||
|
|
||||||
|
result = {}
|
||||||
|
|
||||||
|
if module.check_mode:
|
||||||
|
if state == 'absent' and existing_stack_set:
|
||||||
|
module.exit_json(changed=True, msg='Stack set would be deleted', meta=[])
|
||||||
|
elif state == 'absent' and not existing_stack_set:
|
||||||
|
module.exit_json(changed=False, msg='Stack set doesn\'t exist', meta=[])
|
||||||
|
elif state == 'present' and not existing_stack_set:
|
||||||
|
module.exit_json(changed=True, msg='New stack set would be created', meta=[])
|
||||||
|
elif state == 'present' and existing_stack_set:
|
||||||
|
new_stacks, existing_stacks, unspecified_stacks = compare_stack_instances(
|
||||||
|
cfn,
|
||||||
|
module.params['name'],
|
||||||
|
module.params['accounts'],
|
||||||
|
module.params['regions'],
|
||||||
|
)
|
||||||
|
if new_stacks:
|
||||||
|
module.exit_json(changed=True, msg='New stack instance(s) would be created', meta=[])
|
||||||
|
elif unspecified_stacks and module.params.get('purge_stack_instances'):
|
||||||
|
module.exit_json(changed=True, msg='Old stack instance(s) would be deleted', meta=[])
|
||||||
|
else:
|
||||||
|
# TODO: need to check the template and other settings for correct check mode
|
||||||
|
module.exit_json(changed=False, msg='No changes detected', meta=[])
|
||||||
|
|
||||||
|
changed = False
|
||||||
|
if state == 'present':
|
||||||
|
if not existing_stack_set:
|
||||||
|
# on create this parameter has a different name, and cannot be referenced later in the job log
|
||||||
|
stack_params['ClientRequestToken'] = 'Ansible-StackSet-Create-{0}'.format(operation_uuid)
|
||||||
|
changed = True
|
||||||
|
create_stack_set(module, stack_params, cfn)
|
||||||
|
else:
|
||||||
|
stack_params['OperationId'] = 'Ansible-StackSet-Update-{0}'.format(operation_uuid)
|
||||||
|
operation_ids.append(stack_params['OperationId'])
|
||||||
|
if module.params.get('regions'):
|
||||||
|
stack_params['OperationPreferences'] = get_operation_preferences(module)
|
||||||
|
changed |= update_stack_set(module, stack_params, cfn)
|
||||||
|
|
||||||
|
# now create/update any appropriate stack instances
|
||||||
|
new_stack_instances, existing_stack_instances, unspecified_stack_instances = compare_stack_instances(
|
||||||
|
cfn,
|
||||||
|
module.params['name'],
|
||||||
|
module.params['accounts'],
|
||||||
|
module.params['regions'],
|
||||||
|
)
|
||||||
|
if new_stack_instances:
|
||||||
|
operation_ids.append('Ansible-StackInstance-Create-{0}'.format(operation_uuid))
|
||||||
|
changed = True
|
||||||
|
cfn.create_stack_instances(
|
||||||
|
StackSetName=module.params['name'],
|
||||||
|
Accounts=list(set(acct for acct, region in new_stack_instances)),
|
||||||
|
Regions=list(set(region for acct, region in new_stack_instances)),
|
||||||
|
OperationPreferences=get_operation_preferences(module),
|
||||||
|
OperationId=operation_ids[-1],
|
||||||
|
)
|
||||||
|
else:
|
||||||
|
operation_ids.append('Ansible-StackInstance-Update-{0}'.format(operation_uuid))
|
||||||
|
cfn.update_stack_instances(
|
||||||
|
StackSetName=module.params['name'],
|
||||||
|
Accounts=list(set(acct for acct, region in existing_stack_instances)),
|
||||||
|
Regions=list(set(region for acct, region in existing_stack_instances)),
|
||||||
|
OperationPreferences=get_operation_preferences(module),
|
||||||
|
OperationId=operation_ids[-1],
|
||||||
|
)
|
||||||
|
for op in operation_ids:
|
||||||
|
await_stack_set_operation(
|
||||||
|
module, cfn, operation_id=op,
|
||||||
|
stack_set_name=module.params['name'],
|
||||||
|
max_wait=module.params.get('wait_timeout'),
|
||||||
|
)
|
||||||
|
|
||||||
|
elif state == 'absent':
|
||||||
|
if not existing_stack_set:
|
||||||
|
module.exit_json(msg='Stack set {0} does not exist'.format(module.params['name']))
|
||||||
|
if module.params.get('purge_stack_instances') is False:
|
||||||
|
pass
|
||||||
|
try:
|
||||||
|
cfn.delete_stack_set(
|
||||||
|
StackSetName=module.params['name'],
|
||||||
|
)
|
||||||
|
module.exit_json(msg='Stack set {0} deleted'.format(module.params['name']))
|
||||||
|
except is_boto3_error_code('OperationInProgressException') as e: # pylint: disable=duplicate-except
|
||||||
|
module.fail_json_aws(e, msg='Cannot delete stack {0} while there is an operation in progress'.format(module.params['name']))
|
||||||
|
except is_boto3_error_code('StackSetNotEmptyException'): # pylint: disable=duplicate-except
|
||||||
|
delete_instances_op = 'Ansible-StackInstance-Delete-{0}'.format(operation_uuid)
|
||||||
|
cfn.delete_stack_instances(
|
||||||
|
StackSetName=module.params['name'],
|
||||||
|
Accounts=module.params['accounts'],
|
||||||
|
Regions=module.params['regions'],
|
||||||
|
RetainStacks=(not module.params.get('purge_stacks')),
|
||||||
|
OperationId=delete_instances_op
|
||||||
|
)
|
||||||
|
await_stack_set_operation(
|
||||||
|
module, cfn, operation_id=delete_instances_op,
|
||||||
|
stack_set_name=stack_params['StackSetName'],
|
||||||
|
max_wait=module.params.get('wait_timeout'),
|
||||||
|
)
|
||||||
|
try:
|
||||||
|
cfn.delete_stack_set(
|
||||||
|
StackSetName=module.params['name'],
|
||||||
|
)
|
||||||
|
except is_boto3_error_code('StackSetNotEmptyException') as exc: # pylint: disable=duplicate-except
|
||||||
|
# this time, it is likely that either the delete failed or there are more stacks.
|
||||||
|
instances = cfn.list_stack_instances(
|
||||||
|
StackSetName=module.params['name'],
|
||||||
|
)
|
||||||
|
stack_states = ', '.join('(account={Account}, region={Region}, state={Status})'.format(**i) for i in instances['Summaries'])
|
||||||
|
module.fail_json_aws(exc, msg='Could not purge all stacks, or not all accounts/regions were chosen for deletion: ' + stack_states)
|
||||||
|
module.exit_json(changed=True, msg='Stack set {0} deleted'.format(module.params['name']))
|
||||||
|
|
||||||
|
result.update(**describe_stack_tree(module, stack_params['StackSetName'], operation_ids=operation_ids))
|
||||||
|
if any(o['status'] == 'FAILED' for o in result['operations']):
|
||||||
|
module.fail_json(msg="One or more operations failed to execute", **result)
|
||||||
|
module.exit_json(changed=changed, **result)
|
||||||
|
|
||||||
|
|
||||||
|
if __name__ == '__main__':
|
||||||
|
main()
|
|
@ -0,0 +1,2 @@
|
||||||
|
cloud/aws
|
||||||
|
unsupported
|
|
@ -0,0 +1,6 @@
|
||||||
|
AWSTemplateFormatVersion: "2010-09-09"
|
||||||
|
Parameters: {}
|
||||||
|
Resources:
|
||||||
|
Bukkit:
|
||||||
|
Type: "AWS::S3::Bucket"
|
||||||
|
Properties: {}
|
|
@ -0,0 +1,9 @@
|
||||||
|
AWSTemplateFormatVersion: "2010-09-09"
|
||||||
|
Parameters: {}
|
||||||
|
Resources:
|
||||||
|
Bukkit:
|
||||||
|
Type: "AWS::S3::Bucket"
|
||||||
|
Properties: {}
|
||||||
|
other:
|
||||||
|
Type: "AWS::SNS::Topic"
|
||||||
|
Properties: {}
|
|
@ -0,0 +1,5 @@
|
||||||
|
- hosts: localhost
|
||||||
|
connection: local
|
||||||
|
|
||||||
|
roles:
|
||||||
|
- ../../cloudformation_stack_set
|
19
test/integration/targets/cloudformation_stack_set/runme.sh
Executable file
19
test/integration/targets/cloudformation_stack_set/runme.sh
Executable file
|
@ -0,0 +1,19 @@
|
||||||
|
#!/usr/bin/env bash
|
||||||
|
|
||||||
|
# We don't set -u here, due to pypa/virtualenv#150
|
||||||
|
set -ex
|
||||||
|
|
||||||
|
MYTMPDIR=$(mktemp -d 2>/dev/null || mktemp -d -t 'mytmpdir')
|
||||||
|
|
||||||
|
trap 'rm -rf "${MYTMPDIR}"' EXIT
|
||||||
|
|
||||||
|
# This is needed for the ubuntu1604py3 tests
|
||||||
|
# Ubuntu patches virtualenv to make the default python2
|
||||||
|
# but for the python3 tests we need virtualenv to use python3
|
||||||
|
PYTHON=${ANSIBLE_TEST_PYTHON_INTERPRETER:-python}
|
||||||
|
|
||||||
|
# Run full test suite
|
||||||
|
virtualenv --system-site-packages --python "${PYTHON}" "${MYTMPDIR}/botocore-recent"
|
||||||
|
source "${MYTMPDIR}/botocore-recent/bin/activate"
|
||||||
|
$PYTHON -m pip install 'botocore>1.10.26' boto3
|
||||||
|
ansible-playbook -i ../../inventory -e @../../integration_config.yml -e @../../cloud-config-aws.yml -v playbooks/full_test.yml "$@"
|
186
test/integration/targets/cloudformation_stack_set/tasks/main.yml
Normal file
186
test/integration/targets/cloudformation_stack_set/tasks/main.yml
Normal file
|
@ -0,0 +1,186 @@
|
||||||
|
---
|
||||||
|
# tasks file for cloudformation_stack_set module tests
|
||||||
|
# These tests require access to two separate AWS accounts
|
||||||
|
|
||||||
|
- name: set up aws connection info
|
||||||
|
set_fact:
|
||||||
|
aws_connection_info: &aws_connection_info
|
||||||
|
aws_access_key: "{{ aws_access_key }}"
|
||||||
|
aws_secret_key: "{{ aws_secret_key }}"
|
||||||
|
security_token: "{{ security_token }}"
|
||||||
|
region: "{{ aws_region }}"
|
||||||
|
aws_secondary_connection_info: &aws_secondary_connection_info
|
||||||
|
aws_access_key: "{{ secondary_aws_access_key }}"
|
||||||
|
aws_secret_key: "{{ secondary_aws_secret_key }}"
|
||||||
|
security_token: "{{ secondary_security_token }}"
|
||||||
|
region: "{{ aws_region }}"
|
||||||
|
no_log: yes
|
||||||
|
|
||||||
|
- block:
|
||||||
|
- name: Get current account ID
|
||||||
|
aws_caller_facts:
|
||||||
|
<<: *aws_connection_info
|
||||||
|
register: whoami
|
||||||
|
- name: Get current account ID
|
||||||
|
aws_caller_facts:
|
||||||
|
<<: *aws_secondary_connection_info
|
||||||
|
register: target_acct
|
||||||
|
|
||||||
|
- name: Policy to allow assuming stackset execution role
|
||||||
|
iam_managed_policy:
|
||||||
|
policy_name: AssumeCfnStackSetExecRole
|
||||||
|
state: present
|
||||||
|
<<: *aws_connection_info
|
||||||
|
policy:
|
||||||
|
Version: '2012-10-17'
|
||||||
|
Statement:
|
||||||
|
- Action: 'sts:AssumeRole'
|
||||||
|
Effect: Allow
|
||||||
|
Resource: arn:aws:iam::*:role/CfnStackSetExecRole
|
||||||
|
policy_description: Assume CfnStackSetExecRole
|
||||||
|
|
||||||
|
- name: Create an execution role for us to use
|
||||||
|
iam_role:
|
||||||
|
name: CfnStackSetExecRole
|
||||||
|
<<: *aws_secondary_connection_info
|
||||||
|
assume_role_policy_document:
|
||||||
|
Version: '2012-10-17'
|
||||||
|
Statement:
|
||||||
|
- Action: 'sts:AssumeRole'
|
||||||
|
Effect: Allow
|
||||||
|
Principal:
|
||||||
|
AWS: '{{ whoami.account }}'
|
||||||
|
managed_policy:
|
||||||
|
- arn:aws:iam::aws:policy/PowerUserAccess
|
||||||
|
|
||||||
|
- name: Create an administration role for us to use
|
||||||
|
iam_role:
|
||||||
|
name: CfnStackSetAdminRole
|
||||||
|
<<: *aws_connection_info
|
||||||
|
assume_role_policy_document:
|
||||||
|
Version: '2012-10-17'
|
||||||
|
Statement:
|
||||||
|
- Action: 'sts:AssumeRole'
|
||||||
|
Effect: Allow
|
||||||
|
Principal:
|
||||||
|
Service: 'cloudformation.amazonaws.com'
|
||||||
|
managed_policy:
|
||||||
|
- arn:aws:iam::{{ whoami.account }}:policy/AssumeCfnStackSetExecRole
|
||||||
|
#- arn:aws:iam::aws:policy/PowerUserAccess
|
||||||
|
|
||||||
|
- name: Should fail without account/regions
|
||||||
|
cloudformation_stack_set:
|
||||||
|
<<: *aws_connection_info
|
||||||
|
name: TestSetOne
|
||||||
|
description: TestStack Prime
|
||||||
|
tags:
|
||||||
|
Some: Thing
|
||||||
|
Type: Test
|
||||||
|
wait: true
|
||||||
|
template: test_bucket_stack.yml
|
||||||
|
register: result
|
||||||
|
ignore_errors: true
|
||||||
|
- name: assert that running with no account fails
|
||||||
|
assert:
|
||||||
|
that:
|
||||||
|
- result is failed
|
||||||
|
- >
|
||||||
|
"Can't create a stack set without choosing at least one account" in result.msg
|
||||||
|
- name: Should fail without roles
|
||||||
|
cloudformation_stack_set:
|
||||||
|
<<: *aws_connection_info
|
||||||
|
name: TestSetOne
|
||||||
|
description: TestStack Prime
|
||||||
|
tags:
|
||||||
|
Some: Thing
|
||||||
|
Type: Test
|
||||||
|
wait: true
|
||||||
|
regions:
|
||||||
|
- '{{ aws_region }}'
|
||||||
|
accounts:
|
||||||
|
- '{{ whoami.account }}'
|
||||||
|
template_body: '{{ lookup("file", "test_bucket_stack.yml") }}'
|
||||||
|
register: result
|
||||||
|
ignore_errors: true
|
||||||
|
- name: assert that running with no account fails
|
||||||
|
assert:
|
||||||
|
that:
|
||||||
|
- result is failed
|
||||||
|
|
||||||
|
- name: Create an execution role for us to use
|
||||||
|
iam_role:
|
||||||
|
name: CfnStackSetExecRole
|
||||||
|
state: absent
|
||||||
|
<<: *aws_connection_info
|
||||||
|
assume_role_policy_document:
|
||||||
|
Version: '2012-10-17'
|
||||||
|
Statement:
|
||||||
|
- Action: 'sts:AssumeRole'
|
||||||
|
Effect: Allow
|
||||||
|
Principal:
|
||||||
|
AWS: arn:aws:iam::{{ whoami.account }}:root
|
||||||
|
managed_policy:
|
||||||
|
- arn:aws:iam::aws:policy/PowerUserAccess
|
||||||
|
|
||||||
|
- name: Create stack with roles
|
||||||
|
cloudformation_stack_set:
|
||||||
|
<<: *aws_connection_info
|
||||||
|
name: TestSetTwo
|
||||||
|
description: TestStack Dos
|
||||||
|
tags:
|
||||||
|
Some: Thing
|
||||||
|
Type: Test
|
||||||
|
wait: true
|
||||||
|
regions:
|
||||||
|
- '{{ aws_region }}'
|
||||||
|
accounts:
|
||||||
|
- '{{ target_acct.account }}'
|
||||||
|
exec_role_name: CfnStackSetExecRole
|
||||||
|
admin_role_arn: arn:aws:iam::{{ whoami.account }}:role/CfnStackSetAdminRole
|
||||||
|
template_body: '{{ lookup("file", "test_bucket_stack.yml") }}'
|
||||||
|
register: result
|
||||||
|
|
||||||
|
- name: Update stack with roles
|
||||||
|
cloudformation_stack_set:
|
||||||
|
<<: *aws_connection_info
|
||||||
|
name: TestSetTwo
|
||||||
|
description: TestStack Dos
|
||||||
|
tags:
|
||||||
|
Some: Thing
|
||||||
|
Type: Test
|
||||||
|
wait: true
|
||||||
|
regions:
|
||||||
|
- '{{ aws_region }}'
|
||||||
|
accounts:
|
||||||
|
- '{{ target_acct.account }}'
|
||||||
|
exec_role_name: CfnStackSetExecRole
|
||||||
|
admin_role_arn: arn:aws:iam::{{ whoami.account }}:role/CfnStackSetAdminRole
|
||||||
|
template_body: '{{ lookup("file", "test_modded_bucket_stack.yml") }}'
|
||||||
|
always:
|
||||||
|
- name: Clean up stack one
|
||||||
|
cloudformation_stack_set:
|
||||||
|
<<: *aws_connection_info
|
||||||
|
name: TestSetOne
|
||||||
|
wait: true
|
||||||
|
regions:
|
||||||
|
- '{{ aws_region }}'
|
||||||
|
accounts:
|
||||||
|
- '{{ whoami.account }}'
|
||||||
|
purge_stacks: true
|
||||||
|
state: absent
|
||||||
|
- name: Clean up stack two
|
||||||
|
cloudformation_stack_set:
|
||||||
|
<<: *aws_connection_info
|
||||||
|
name: TestSetTwo
|
||||||
|
description: TestStack Dos
|
||||||
|
purge_stacks: true
|
||||||
|
tags:
|
||||||
|
Some: Thing
|
||||||
|
Type: Test
|
||||||
|
wait: true
|
||||||
|
regions:
|
||||||
|
- '{{ aws_region }}'
|
||||||
|
accounts:
|
||||||
|
- '{{ target_acct.account }}'
|
||||||
|
template_body: '{{ lookup("file", "test_bucket_stack.yml") }}'
|
||||||
|
state: absent
|
Loading…
Reference in a new issue