diff --git a/CHANGELOG.rst b/CHANGELOG.rst index 3a5c31399fd..3c330f1d0f6 100644 --- a/CHANGELOG.rst +++ b/CHANGELOG.rst @@ -5,6 +5,126 @@ community.aws Release Notes .. contents:: Topics +v2.0.0 +====== + +Major Changes +------------- + +- community.aws collection - The community.aws collection has dropped support for ``botocore<1.18.0`` and ``boto3<1.15.0`` (https://github.com/ansible-collections/community.aws/pull/711). Most modules will continue to work with older versions of the AWS SDK, however compatability with older versions of the SDK is not guaranteed and will not be tested. When using older versions of the SDK a warning will be emitted by Ansible (https://github.com/ansible-collections/amazon.aws/pull/442). + +Minor Changes +------------- + +- aws_eks_cluster - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). +- aws_kms_info - use a generator rather than list comprehension (https://github.com/ansible-collections/community.aws/pull/688). +- aws_s3_bucket_info - added test for botocore>=1.18.11 when attempting to fetch bucket ownership controls (https://github.com/ansible-collections/community.aws/pull/682) +- aws_ses_rule_set - use a generator rather than list comprehension (https://github.com/ansible-collections/community.aws/pull/688). +- aws_sgw_info - ensure module runs in check_mode (https://github.com/ansible-collections/community.aws/issues/659). +- cloudformation_exports_info - ensure module runs in check_mode (https://github.com/ansible-collections/community.aws/issues/659). +- cloudformation_stack_set - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). +- cloudfront_info - ensure module runs in check_mode (https://github.com/ansible-collections/community.aws/issues/659). +- cloudwatchevent_rule - use a generator rather than list comprehension (https://github.com/ansible-collections/community.aws/pull/688). +- dynamodb_table - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). +- dynamodb_ttl - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). +- ec2_ami_copy - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). +- ec2_asg - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). +- ec2_asg_info - ensure module runs in check_mode (https://github.com/ansible-collections/community.aws/issues/659). +- ec2_launch_template - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). +- ec2_lc_info - ensure module runs in check_mode (https://github.com/ansible-collections/community.aws/issues/659). +- ec2_transit_gateway - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). +- ec2_transit_gateway_info - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). +- ec2_vpc_peer - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). +- ec2_vpc_peer - use shared code for tagging peering connections (https://github.com/ansible-collections/community.aws/pull/614). +- ec2_vpc_route_table - use shared code for tagging route tables (https://github.com/ansible-collections/community.aws/pull/616). +- ec2_vpc_vgw - fix arguments-renamed pylint issue (https://github.com/ansible-collections/community.aws/pull/686). +- ec2_vpc_vpn - fix arguments-renamed pylint issue (https://github.com/ansible-collections/community.aws/pull/686). +- ecs_ecr - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). +- ecs_service - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). +- ecs_task - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). +- ecs_task - remove unused import (https://github.com/ansible-collections/community.aws/pull/686). +- ecs_taskdefinition - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). +- efs - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). +- efs_info - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). +- elasticache_subnet_group - add return values (https://github.com/ansible-collections/community.aws/pull/723). +- elasticache_subnet_group - add support for check_mode (https://github.com/ansible-collections/community.aws/pull/723). +- elasticache_subnet_group - module migrated to boto3 AWS SDK (https://github.com/ansible-collections/community.aws/pull/723). +- elb_application_lb - added ``ip_address_type`` parameter to support changing application load balancer configuration (https://github.com/ansible-collections/community.aws/pull/499). +- elb_application_lb_info - added ``ip_address_type`` in output when gathering application load balancer parameters (https://github.com/ansible-collections/community.aws/pull/499). +- elb_instance - make elb_instance idempotent when deregistering instances. Merged from ec2_elb U(https://github.com/ansible/ansible/pull/31660). +- elb_network_lb - added ``ip_address_type`` parameter to support changing network load balancer configuration (https://github.com/ansible-collections/community.aws/pull/499). +- elb_target_group - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). +- elb_target_group - use a generator rather than list comprehension (https://github.com/ansible-collections/community.aws/pull/688). +- iam - use a generator rather than list comprehension (https://github.com/ansible-collections/community.aws/pull/688). +- iam_group - use a generator rather than list comprehension (https://github.com/ansible-collections/community.aws/pull/688). +- iam_mfa_device_info - ensure module runs in check_mode (https://github.com/ansible-collections/community.aws/issues/659). +- iam_role - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). +- iam_role - use a generator rather than list comprehension (https://github.com/ansible-collections/community.aws/pull/688). +- iam_server_certificate_info - ensure module runs in check_mode (https://github.com/ansible-collections/community.aws/issues/659). +- iam_user - use a generator rather than list comprehension (https://github.com/ansible-collections/community.aws/pull/688). +- kms_info - added a new ``keys_attr`` parameter to continue returning the key details in the ``keys`` attribute as well as the ``kms_keys`` attribute (https://github.com/ansible-collections/community.aws/pull/648). +- lambda - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). +- rds_instance - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). +- rds_instance - convert ``preferred_maintenance_window`` days into lowercase so changed returns properly (https://github.com/ansible-collections/community.aws/pull/516). +- rds_instance - use a generator rather than list comprehension (https://github.com/ansible-collections/community.aws/pull/688). +- route53 - add rate-limiting retries while waiting for changes to propagate (https://github.com/ansible-collections/community.aws/pull/564). +- route53 - add retries on ``PriorRequestNotComplete`` errors (https://github.com/ansible-collections/community.aws/pull/564). +- route53 - update retry ``max_delay`` setting so that it can be set above 60 seconds (https://github.com/ansible-collections/community.aws/pull/564). +- sns_topic - Added ``topic_type`` parameter to select type of SNS topic (either FIFO or Standard) (https://github.com/ansible-collections/community.aws/pull/599). +- sqs_queue - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). +- various community.aws modules - remove unused imports (https://github.com/ansible-collections/community.aws/pull/629) +- wafv2_resources_info - ensure module runs in check_mode (https://github.com/ansible-collections/community.aws/issues/659). +- wafv2_web_acl_info - ensure module runs in check_mode (https://github.com/ansible-collections/community.aws/issues/659). + +Breaking Changes / Porting Guide +-------------------------------- + +- ec2_instance - The module has been migrated to the ``amazon.aws`` collection. Playbooks using the Fully Qualified Collection Name for this module should be updated to use ``amazon.aws.ec2_instance``. +- ec2_instance_info - The module has been migrated to the ``amazon.aws`` collection. Playbooks using the Fully Qualified Collection Name for this module should be updated to use ``amazon.aws.ec2_instance_info``. +- ec2_vpc_endpoint - The module has been migrated from the ``community.aws`` collection. Playbooks using the Fully Qualified Collection Name for this module should be updated to use ``amazon.aws.ec2_vpc_endpoint``. +- ec2_vpc_endpoint_facts - The module has been migrated from the ``community.aws`` collection. Playbooks using the Fully Qualified Collection Name for this module should be updated to use ``amazon.aws.ec2_vpc_endpoint_info``. +- ec2_vpc_endpoint_info - The module has been migrated from the ``community.aws`` collection. Playbooks using the Fully Qualified Collection Name for this module should be updated to use ``amazon.aws.ec2_vpc_endpoint_info``. +- ec2_vpc_endpoint_service_info - The module has been migrated from the ``community.aws`` collection. Playbooks using the Fully Qualified Collection Name for this module should be updated to use ``amazon.aws.ec2_vpc_endpoint_service_info``. +- ec2_vpc_igw - The module has been migrated from the ``community.aws`` collection. Playbooks using the Fully Qualified Collection Name for this module should be updated to use ``amazon.aws.ec2_vpc_igw``. +- ec2_vpc_igw_facts - The module has been migrated from the ``community.aws`` collection. Playbooks using the Fully Qualified Collection Name for this module should be updated to use ``amazon.aws.ec2_vpc_igw_info``. +- ec2_vpc_igw_info - The module has been migrated from the ``community.aws`` collection. Playbooks using the Fully Qualified Collection Name for this module should be updated to use ``amazon.aws.ec2_vpc_igw_info``. +- ec2_vpc_nat_gateway - The module has been migrated from the ``community.aws`` collection. Playbooks using the Fully Qualified Collection Name for this module should be updated to use ``amazon.aws.ec2_vpc_nat_gateway``. +- ec2_vpc_nat_gateway_facts - The module has been migrated from the ``community.aws`` collection. Playbooks using the Fully Qualified Collection Name for this module should be updated to use ``amazon.aws.ec2_vpc_nat_gateway_info``. +- ec2_vpc_nat_gateway_info - The module has been migrated from the ``community.aws`` collection. Playbooks using the Fully Qualified Collection Name for this module should be updated to use ``amazon.aws.ec2_vpc_nat_gateway_info``. +- kms_info - key details are now returned in the ``kms_keys`` attribute rather than the ``keys`` attribute (https://github.com/ansible-collections/community.aws/pull/648). + +Deprecated Features +------------------- + +- ec2_elb - the ``ec2_elb`` module has been removed and redirected to the ``elb_instance`` module which functions identically. The original ``ec2_elb`` name is now deprecated and will be removed in release 3.0.0 (https://github.com/ansible-collections/community.aws/pull/586). +- ec2_elb_info - the boto based ``ec2_elb_info`` module has been deprecated in favour of the boto3 based ``elb_classic_lb_info`` module. The ``ec2_elb_info`` module will be removed in release 3.0.0 (https://github.com/ansible-collections/community.aws/pull/586). +- elb_classic_lb - the ``elb_classic_lb`` module has been removed and redirected to the ``amazon.aws.ec2_elb_lb`` module which functions identically. +- iam - the boto based ``iam`` module has been deprecated in favour of the boto3 based ``iam_user``, ``iam_group`` and ``iam_role`` modules. The ``iam`` module will be removed in release 3.0.0 (https://github.com/ansible-collections/community.aws/pull/664). +- rds - the boto based ``rds`` module has been deprecated in favour of the boto3 based ``rds_instance`` module. The ``rds`` module will be removed in release 3.0.0 (https://github.com/ansible-collections/community.aws/pull/663). +- script_inventory_ec2 - The ec2.py inventory script is being moved to a new repository. The script can now be downloaded from https://github.com/ansible-community/contrib-scripts/blob/main/inventory/ec2.py and will be removed from this collection in the 3.0 release. We recommend migrating from the script to the `amazon.aws.ec2` inventory plugin. + +Bugfixes +-------- + +- aws_secret - fix deletion idempotency when not using instant deletion (https://github.com/ansible-collections/community.aws/pull/681). +- aws_ssm - rename ``retries`` to ``reconnection_retries`` to avoid conflict with task retries +- ec2_vpc_peer - automatically retry when attempting to tag freshly created peering connections (https://github.com/ansible-collections/community.aws/pull/614). +- ec2_vpc_route_table - automatically retry when attempting to modify freshly created route tables (https://github.com/ansible-collections/community.aws/pull/616). +- ecs_taskdefinition - ensure cast to integer (https://github.com/ansible-collections/community.aws/pull/574). +- ecs_taskdefinition - fix idempotency (https://github.com/ansible-collections/community.aws/pull/574). +- ecs_taskdefinition - fix typo in ecs task defination for env file validations (https://github.com/ansible-collections/community.aws/pull/600). +- iam_role - Modified iam_role internal code to replace update_role_description with update_role (https://github.com/ansible-collections/community.aws/pull/697). +- route53 - fix typo in waiter configuration that prevented management of the delays (https://github.com/ansible-collections/community.aws/pull/564). +- s3_sync - fix handling individual file path to upload a individual file to s3 bucket (https://github.com/ansible-collections/community.aws/pull/692). +- sqs_queue - fix queue attribute comparison to make module idempotent (https://github.com/ansible-collections/community.aws/pull/592). + +New Modules +----------- + +- aws_msk_cluster - Manage Amazon MSK clusters. +- aws_msk_config - Manage Amazon MSK cluster configurations. +- efs_tag - create and remove tags on Amazon EFS resources + v1.5.0 ====== diff --git a/README.md b/README.md index 379b7aca82b..a04e88b9e9d 100644 --- a/README.md +++ b/README.md @@ -59,6 +59,8 @@ Name | Description [community.aws.aws_inspector_target](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.aws_inspector_target_module.rst)|Create, Update and Delete Amazon Inspector Assessment Targets [community.aws.aws_kms](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.aws_kms_module.rst)|Perform various KMS management tasks. [community.aws.aws_kms_info](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.aws_kms_info_module.rst)|Gather information about AWS KMS keys +[community.aws.aws_msk_cluster](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.aws_msk_cluster_module.rst)|Manage Amazon MSK clusters. +[community.aws.aws_msk_config](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.aws_msk_config_module.rst)|Manage Amazon MSK cluster configurations. [community.aws.aws_region_info](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.aws_region_info_module.rst)|Gather information about AWS regions. [community.aws.aws_s3_bucket_info](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.aws_s3_bucket_info_module.rst)|lists S3 buckets in AWS [community.aws.aws_s3_cors](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.aws_s3_cors_module.rst)|Manage CORS for S3 buckets in AWS @@ -98,10 +100,7 @@ Name | Description [community.aws.ec2_customer_gateway_info](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.ec2_customer_gateway_info_module.rst)|Gather information about customer gateways in AWS [community.aws.ec2_eip](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.ec2_eip_module.rst)|manages EC2 elastic IP (EIP) addresses. [community.aws.ec2_eip_info](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.ec2_eip_info_module.rst)|List EC2 EIP details -[community.aws.ec2_elb](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.ec2_elb_module.rst)|De-registers or registers instances from EC2 ELBs [community.aws.ec2_elb_info](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.ec2_elb_info_module.rst)|Gather information about EC2 Elastic Load Balancers in AWS -[community.aws.ec2_instance](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.ec2_instance_module.rst)|Create & manage EC2 instances -[community.aws.ec2_instance_info](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.ec2_instance_info_module.rst)|Gather information about ec2 instances in AWS [community.aws.ec2_launch_template](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.ec2_launch_template_module.rst)|Manage EC2 launch templates [community.aws.ec2_lc](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.ec2_lc_module.rst)|Create or delete AWS Autoscaling Launch Configurations [community.aws.ec2_lc_find](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.ec2_lc_find_module.rst)|Find AWS Autoscaling Launch Configurations @@ -114,15 +113,8 @@ Name | Description [community.aws.ec2_transit_gateway](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.ec2_transit_gateway_module.rst)|Create and delete AWS Transit Gateways [community.aws.ec2_transit_gateway_info](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.ec2_transit_gateway_info_module.rst)|Gather information about ec2 transit gateways in AWS [community.aws.ec2_vpc_egress_igw](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.ec2_vpc_egress_igw_module.rst)|Manage an AWS VPC Egress Only Internet gateway -[community.aws.ec2_vpc_endpoint](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.ec2_vpc_endpoint_module.rst)|Create and delete AWS VPC Endpoints. -[community.aws.ec2_vpc_endpoint_info](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.ec2_vpc_endpoint_info_module.rst)|Retrieves AWS VPC endpoints details using AWS methods. -[community.aws.ec2_vpc_endpoint_service_info](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.ec2_vpc_endpoint_service_info_module.rst)|retrieves AWS VPC endpoint service details -[community.aws.ec2_vpc_igw](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.ec2_vpc_igw_module.rst)|Manage an AWS VPC Internet gateway -[community.aws.ec2_vpc_igw_info](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.ec2_vpc_igw_info_module.rst)|Gather information about internet gateways in AWS [community.aws.ec2_vpc_nacl](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.ec2_vpc_nacl_module.rst)|create and delete Network ACLs. [community.aws.ec2_vpc_nacl_info](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.ec2_vpc_nacl_info_module.rst)|Gather information about Network ACLs in an AWS VPC -[community.aws.ec2_vpc_nat_gateway](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.ec2_vpc_nat_gateway_module.rst)|Manage AWS VPC NAT Gateways. -[community.aws.ec2_vpc_nat_gateway_info](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.ec2_vpc_nat_gateway_info_module.rst)|Retrieves AWS VPC Managed Nat Gateway details using AWS methods. [community.aws.ec2_vpc_peer](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.ec2_vpc_peer_module.rst)|create, delete, accept, and reject VPC peering connections between two VPCs. [community.aws.ec2_vpc_peering_info](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.ec2_vpc_peering_info_module.rst)|Retrieves AWS VPC Peering details using AWS methods. [community.aws.ec2_vpc_route_table](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.ec2_vpc_route_table_module.rst)|Manage route tables for AWS virtual private clouds @@ -143,6 +135,7 @@ Name | Description [community.aws.ecs_taskdefinition_info](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.ecs_taskdefinition_info_module.rst)|Describe a task definition in ECS [community.aws.efs](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.efs_module.rst)|create and maintain EFS file systems [community.aws.efs_info](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.efs_info_module.rst)|Get information about Amazon EFS file systems +[community.aws.efs_tag](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.efs_tag_module.rst)|create and remove tags on Amazon EFS resources [community.aws.elasticache](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.elasticache_module.rst)|Manage cache clusters in Amazon ElastiCache [community.aws.elasticache_info](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.elasticache_info_module.rst)|Retrieve information for AWS ElastiCache clusters [community.aws.elasticache_parameter_group](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.elasticache_parameter_group_module.rst)|Manage cache parameter groups in Amazon ElastiCache. @@ -150,7 +143,6 @@ Name | Description [community.aws.elasticache_subnet_group](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.elasticache_subnet_group_module.rst)|manage ElastiCache subnet groups [community.aws.elb_application_lb](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.elb_application_lb_module.rst)|Manage an Application Load Balancer [community.aws.elb_application_lb_info](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.elb_application_lb_info_module.rst)|Gather information about application ELBs in AWS -[community.aws.elb_classic_lb](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.elb_classic_lb_module.rst)|Creates or destroys Amazon ELB. [community.aws.elb_classic_lb_info](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.elb_classic_lb_info_module.rst)|Gather information about EC2 Elastic Load Balancers in AWS [community.aws.elb_instance](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.elb_instance_module.rst)|De-registers or registers instances from EC2 ELBs [community.aws.elb_network_lb](https://github.com/ansible-collections/community.aws/blob/main/docs/community.aws.elb_network_lb_module.rst)|Manage a Network Load Balancer diff --git a/changelogs/changelog.yaml b/changelogs/changelog.yaml index 1dfb7e79f32..ca10bd97e9e 100644 --- a/changelogs/changelog.yaml +++ b/changelogs/changelog.yaml @@ -1125,3 +1125,222 @@ releases: name: wafv2_web_acl_info namespace: '' release_date: '2021-04-27' + 2.0.0: + changes: + breaking_changes: + - ec2_instance - The module has been migrated to the ``amazon.aws`` collection. + Playbooks using the Fully Qualified Collection Name for this module should + be updated to use ``amazon.aws.ec2_instance``. + - ec2_instance_info - The module has been migrated to the ``amazon.aws`` collection. + Playbooks using the Fully Qualified Collection Name for this module should + be updated to use ``amazon.aws.ec2_instance_info``. + - ec2_vpc_endpoint - The module has been migrated from the ``community.aws`` + collection. Playbooks using the Fully Qualified Collection Name for this module + should be updated to use ``amazon.aws.ec2_vpc_endpoint``. + - ec2_vpc_endpoint_facts - The module has been migrated from the ``community.aws`` + collection. Playbooks using the Fully Qualified Collection Name for this module + should be updated to use ``amazon.aws.ec2_vpc_endpoint_info``. + - ec2_vpc_endpoint_info - The module has been migrated from the ``community.aws`` + collection. Playbooks using the Fully Qualified Collection Name for this module + should be updated to use ``amazon.aws.ec2_vpc_endpoint_info``. + - ec2_vpc_endpoint_service_info - The module has been migrated from the ``community.aws`` + collection. Playbooks using the Fully Qualified Collection Name for this module + should be updated to use ``amazon.aws.ec2_vpc_endpoint_service_info``. + - ec2_vpc_igw - The module has been migrated from the ``community.aws`` collection. + Playbooks using the Fully Qualified Collection Name for this module should + be updated to use ``amazon.aws.ec2_vpc_igw``. + - ec2_vpc_igw_facts - The module has been migrated from the ``community.aws`` + collection. Playbooks using the Fully Qualified Collection Name for this module + should be updated to use ``amazon.aws.ec2_vpc_igw_info``. + - ec2_vpc_igw_info - The module has been migrated from the ``community.aws`` + collection. Playbooks using the Fully Qualified Collection Name for this module + should be updated to use ``amazon.aws.ec2_vpc_igw_info``. + - ec2_vpc_nat_gateway - The module has been migrated from the ``community.aws`` + collection. Playbooks using the Fully Qualified Collection Name for this module + should be updated to use ``amazon.aws.ec2_vpc_nat_gateway``. + - ec2_vpc_nat_gateway_facts - The module has been migrated from the ``community.aws`` + collection. Playbooks using the Fully Qualified Collection Name for this module + should be updated to use ``amazon.aws.ec2_vpc_nat_gateway_info``. + - ec2_vpc_nat_gateway_info - The module has been migrated from the ``community.aws`` + collection. Playbooks using the Fully Qualified Collection Name for this module + should be updated to use ``amazon.aws.ec2_vpc_nat_gateway_info``. + - kms_info - key details are now returned in the ``kms_keys`` attribute rather + than the ``keys`` attribute (https://github.com/ansible-collections/community.aws/pull/648). + bugfixes: + - aws_secret - fix deletion idempotency when not using instant deletion (https://github.com/ansible-collections/community.aws/pull/681). + - aws_ssm - rename ``retries`` to ``reconnection_retries`` to avoid conflict + with task retries + - ec2_vpc_peer - automatically retry when attempting to tag freshly created + peering connections (https://github.com/ansible-collections/community.aws/pull/614). + - ec2_vpc_route_table - automatically retry when attempting to modify freshly + created route tables (https://github.com/ansible-collections/community.aws/pull/616). + - ecs_taskdefinition - ensure cast to integer (https://github.com/ansible-collections/community.aws/pull/574). + - ecs_taskdefinition - fix idempotency (https://github.com/ansible-collections/community.aws/pull/574). + - ecs_taskdefinition - fix typo in ecs task defination for env file validations + (https://github.com/ansible-collections/community.aws/pull/600). + - iam_role - Modified iam_role internal code to replace update_role_description + with update_role (https://github.com/ansible-collections/community.aws/pull/697). + - route53 - fix typo in waiter configuration that prevented management of the + delays (https://github.com/ansible-collections/community.aws/pull/564). + - s3_sync - fix handling individual file path to upload a individual file to + s3 bucket (https://github.com/ansible-collections/community.aws/pull/692). + - sqs_queue - fix queue attribute comparison to make module idempotent (https://github.com/ansible-collections/community.aws/pull/592). + deprecated_features: + - ec2_elb - the ``ec2_elb`` module has been removed and redirected to the ``elb_instance`` + module which functions identically. The original ``ec2_elb`` name is now deprecated + and will be removed in release 3.0.0 (https://github.com/ansible-collections/community.aws/pull/586). + - ec2_elb_info - the boto based ``ec2_elb_info`` module has been deprecated + in favour of the boto3 based ``elb_classic_lb_info`` module. The ``ec2_elb_info`` + module will be removed in release 3.0.0 (https://github.com/ansible-collections/community.aws/pull/586). + - elb_classic_lb - the ``elb_classic_lb`` module has been removed and redirected + to the ``amazon.aws.ec2_elb_lb`` module which functions identically. + - iam - the boto based ``iam`` module has been deprecated in favour of the boto3 + based ``iam_user``, ``iam_group`` and ``iam_role`` modules. The ``iam`` module + will be removed in release 3.0.0 (https://github.com/ansible-collections/community.aws/pull/664). + - rds - the boto based ``rds`` module has been deprecated in favour of the boto3 + based ``rds_instance`` module. The ``rds`` module will be removed in release + 3.0.0 (https://github.com/ansible-collections/community.aws/pull/663). + - script_inventory_ec2 - The ec2.py inventory script is being moved to a new + repository. The script can now be downloaded from https://github.com/ansible-community/contrib-scripts/blob/main/inventory/ec2.py + and will be removed from this collection in the 3.0 release. We recommend + migrating from the script to the `amazon.aws.ec2` inventory plugin. + major_changes: + - community.aws collection - The community.aws collection has dropped support + for ``botocore<1.18.0`` and ``boto3<1.15.0`` (https://github.com/ansible-collections/community.aws/pull/711). + Most modules will continue to work with older versions of the AWS SDK, however + compatability with older versions of the SDK is not guaranteed and will not + be tested. When using older versions of the SDK a warning will be emitted + by Ansible (https://github.com/ansible-collections/amazon.aws/pull/442). + minor_changes: + - aws_eks_cluster - Tests for compatability with older versions of the AWS SDKs + have been removed (https://github.com/ansible-collections/community.aws/pull/675). + - aws_kms_info - use a generator rather than list comprehension (https://github.com/ansible-collections/community.aws/pull/688). + - aws_s3_bucket_info - added test for botocore>=1.18.11 when attempting to fetch + bucket ownership controls (https://github.com/ansible-collections/community.aws/pull/682) + - aws_ses_rule_set - use a generator rather than list comprehension (https://github.com/ansible-collections/community.aws/pull/688). + - aws_sgw_info - ensure module runs in check_mode (https://github.com/ansible-collections/community.aws/issues/659). + - cloudformation_exports_info - ensure module runs in check_mode (https://github.com/ansible-collections/community.aws/issues/659). + - cloudformation_stack_set - Tests for compatability with older versions of + the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). + - cloudfront_info - ensure module runs in check_mode (https://github.com/ansible-collections/community.aws/issues/659). + - cloudwatchevent_rule - use a generator rather than list comprehension (https://github.com/ansible-collections/community.aws/pull/688). + - dynamodb_table - Tests for compatability with older versions of the AWS SDKs + have been removed (https://github.com/ansible-collections/community.aws/pull/675). + - dynamodb_ttl - Tests for compatability with older versions of the AWS SDKs + have been removed (https://github.com/ansible-collections/community.aws/pull/675). + - ec2_ami_copy - Tests for compatability with older versions of the AWS SDKs + have been removed (https://github.com/ansible-collections/community.aws/pull/675). + - ec2_asg - Tests for compatability with older versions of the AWS SDKs have + been removed (https://github.com/ansible-collections/community.aws/pull/675). + - ec2_asg_info - ensure module runs in check_mode (https://github.com/ansible-collections/community.aws/issues/659). + - ec2_launch_template - Tests for compatability with older versions of the AWS + SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). + - ec2_lc_info - ensure module runs in check_mode (https://github.com/ansible-collections/community.aws/issues/659). + - ec2_transit_gateway - Tests for compatability with older versions of the AWS + SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). + - ec2_transit_gateway_info - Tests for compatability with older versions of + the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). + - ec2_vpc_peer - Tests for compatability with older versions of the AWS SDKs + have been removed (https://github.com/ansible-collections/community.aws/pull/675). + - ec2_vpc_peer - use shared code for tagging peering connections (https://github.com/ansible-collections/community.aws/pull/614). + - ec2_vpc_route_table - use shared code for tagging route tables (https://github.com/ansible-collections/community.aws/pull/616). + - ec2_vpc_vgw - fix arguments-renamed pylint issue (https://github.com/ansible-collections/community.aws/pull/686). + - ec2_vpc_vpn - fix arguments-renamed pylint issue (https://github.com/ansible-collections/community.aws/pull/686). + - ecs_ecr - Tests for compatability with older versions of the AWS SDKs have + been removed (https://github.com/ansible-collections/community.aws/pull/675). + - ecs_service - Tests for compatability with older versions of the AWS SDKs + have been removed (https://github.com/ansible-collections/community.aws/pull/675). + - ecs_task - Tests for compatability with older versions of the AWS SDKs have + been removed (https://github.com/ansible-collections/community.aws/pull/675). + - ecs_task - remove unused import (https://github.com/ansible-collections/community.aws/pull/686). + - ecs_taskdefinition - Tests for compatability with older versions of the AWS + SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). + - efs - Tests for compatability with older versions of the AWS SDKs have been + removed (https://github.com/ansible-collections/community.aws/pull/675). + - efs_info - Tests for compatability with older versions of the AWS SDKs have + been removed (https://github.com/ansible-collections/community.aws/pull/675). + - elasticache_subnet_group - add return values (https://github.com/ansible-collections/community.aws/pull/723). + - elasticache_subnet_group - add support for check_mode (https://github.com/ansible-collections/community.aws/pull/723). + - elasticache_subnet_group - module migrated to boto3 AWS SDK (https://github.com/ansible-collections/community.aws/pull/723). + - elb_application_lb - added ``ip_address_type`` parameter to support changing + application load balancer configuration (https://github.com/ansible-collections/community.aws/pull/499). + - elb_application_lb_info - added ``ip_address_type`` in output when gathering + application load balancer parameters (https://github.com/ansible-collections/community.aws/pull/499). + - elb_instance - make elb_instance idempotent when deregistering instances. Merged + from ec2_elb U(https://github.com/ansible/ansible/pull/31660). + - elb_network_lb - added ``ip_address_type`` parameter to support changing network + load balancer configuration (https://github.com/ansible-collections/community.aws/pull/499). + - elb_target_group - Tests for compatability with older versions of the AWS + SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). + - elb_target_group - use a generator rather than list comprehension (https://github.com/ansible-collections/community.aws/pull/688). + - iam - use a generator rather than list comprehension (https://github.com/ansible-collections/community.aws/pull/688). + - iam_group - use a generator rather than list comprehension (https://github.com/ansible-collections/community.aws/pull/688). + - iam_mfa_device_info - ensure module runs in check_mode (https://github.com/ansible-collections/community.aws/issues/659). + - iam_role - Tests for compatability with older versions of the AWS SDKs have + been removed (https://github.com/ansible-collections/community.aws/pull/675). + - iam_role - use a generator rather than list comprehension (https://github.com/ansible-collections/community.aws/pull/688). + - iam_server_certificate_info - ensure module runs in check_mode (https://github.com/ansible-collections/community.aws/issues/659). + - iam_user - use a generator rather than list comprehension (https://github.com/ansible-collections/community.aws/pull/688). + - kms_info - added a new ``keys_attr`` parameter to continue returning the key + details in the ``keys`` attribute as well as the ``kms_keys`` attribute (https://github.com/ansible-collections/community.aws/pull/648). + - lambda - Tests for compatability with older versions of the AWS SDKs have + been removed (https://github.com/ansible-collections/community.aws/pull/675). + - rds_instance - Tests for compatability with older versions of the AWS SDKs + have been removed (https://github.com/ansible-collections/community.aws/pull/675). + - rds_instance - convert ``preferred_maintenance_window`` days into lowercase + so changed returns properly (https://github.com/ansible-collections/community.aws/pull/516). + - rds_instance - use a generator rather than list comprehension (https://github.com/ansible-collections/community.aws/pull/688). + - route53 - add rate-limiting retries while waiting for changes to propagate + (https://github.com/ansible-collections/community.aws/pull/564). + - route53 - add retries on ``PriorRequestNotComplete`` errors (https://github.com/ansible-collections/community.aws/pull/564). + - route53 - update retry ``max_delay`` setting so that it can be set above 60 + seconds (https://github.com/ansible-collections/community.aws/pull/564). + - sns_topic - Added ``topic_type`` parameter to select type of SNS topic (either + FIFO or Standard) (https://github.com/ansible-collections/community.aws/pull/599). + - sqs_queue - Tests for compatability with older versions of the AWS SDKs have + been removed (https://github.com/ansible-collections/community.aws/pull/675). + - various community.aws modules - remove unused imports (https://github.com/ansible-collections/community.aws/pull/629) + - wafv2_resources_info - ensure module runs in check_mode (https://github.com/ansible-collections/community.aws/issues/659). + - wafv2_web_acl_info - ensure module runs in check_mode (https://github.com/ansible-collections/community.aws/issues/659). + fragments: + - 499-elb-module-add-ip_address_type_option.yml + - 516-rds_instance-preferred_maintenance_window.yml + - 564-route53-retries.yml + - 574-ecs_taskdefinition-improvement.yml + - 586-elb-renames.yml + - 592-sqs_queue-idempotent.yml + - 600-ecs-task-defination-env-file-validations.yml + - 614-ec2_vpc_peer-tagging.yml + - 616-ec2_vpc_route_table-tagging.yml + - 629-imports-cleanup.yml + - 648-kms_info.yml + - 659-checkmode.yml + - 663-deprecate-rds.yml + - 664-deprecate-iam.yml + - 675-boto3-minimums.yml + - 675-boto3-minimums.yml + - 681-aws_secret-deletion-idempotency.yml + - 682-aws_s3_bucket_info-botocore.yml + - 686-pylint.yml + - 688-pylint.yml + - 692-s3_sync-individual-file-path.yml + - 697-iam_role-replace-UpdateRoleDescription-with-UpdateRole.yml + - 723-elasticache_subnet_group-boto3.yml + - deprecate_ec2_inv_script.yml + - migrate_ec2_instance.yml + - migrate_ec2_vpc_endpoint.yml + - migrate_ec2_vpc_igw.yml + - migrate_ec2_vpc_nat_gateway.yml + - rename-connection-retries.yml + - sns_topic_type.yml + modules: + - description: Manage Amazon MSK clusters. + name: aws_msk_cluster + namespace: '' + - description: Manage Amazon MSK cluster configurations. + name: aws_msk_config + namespace: '' + - description: create and remove tags on Amazon EFS resources + name: efs_tag + namespace: '' + release_date: '2021-09-14' diff --git a/changelogs/fragments/499-elb-module-add-ip_address_type_option.yml b/changelogs/fragments/499-elb-module-add-ip_address_type_option.yml deleted file mode 100644 index afc1f939be0..00000000000 --- a/changelogs/fragments/499-elb-module-add-ip_address_type_option.yml +++ /dev/null @@ -1,4 +0,0 @@ -minor_changes: -- elb_application_lb - added ``ip_address_type`` parameter to support changing application load balancer configuration (https://github.com/ansible-collections/community.aws/pull/499). -- elb_network_lb - added ``ip_address_type`` parameter to support changing network load balancer configuration (https://github.com/ansible-collections/community.aws/pull/499). -- elb_application_lb_info - added ``ip_address_type`` in output when gathering application load balancer parameters (https://github.com/ansible-collections/community.aws/pull/499). diff --git a/changelogs/fragments/516-rds_instance-preferred_maintenance_window.yml b/changelogs/fragments/516-rds_instance-preferred_maintenance_window.yml deleted file mode 100644 index c986d684cbc..00000000000 --- a/changelogs/fragments/516-rds_instance-preferred_maintenance_window.yml +++ /dev/null @@ -1,2 +0,0 @@ -minor_changes: -- rds_instance - convert ``preferred_maintenance_window`` days into lowercase so changed returns properly (https://github.com/ansible-collections/community.aws/pull/516). diff --git a/changelogs/fragments/564-route53-retries.yml b/changelogs/fragments/564-route53-retries.yml deleted file mode 100644 index 46a99b56be2..00000000000 --- a/changelogs/fragments/564-route53-retries.yml +++ /dev/null @@ -1,6 +0,0 @@ -bugfixes: -- route53 - fix typo in waiter configuration that prevented management of the delays (https://github.com/ansible-collections/community.aws/pull/564). -minor_changes: -- route53 - add retries on ``PriorRequestNotComplete`` errors (https://github.com/ansible-collections/community.aws/pull/564). -- route53 - update retry ``max_delay`` setting so that it can be set above 60 seconds (https://github.com/ansible-collections/community.aws/pull/564). -- route53 - add rate-limiting retries while waiting for changes to propagate (https://github.com/ansible-collections/community.aws/pull/564). diff --git a/changelogs/fragments/574-ecs_taskdefinition-improvement.yml b/changelogs/fragments/574-ecs_taskdefinition-improvement.yml deleted file mode 100644 index c8667401464..00000000000 --- a/changelogs/fragments/574-ecs_taskdefinition-improvement.yml +++ /dev/null @@ -1,3 +0,0 @@ -bugfixes: -- ecs_taskdefinition - ensure cast to integer (https://github.com/ansible-collections/community.aws/pull/574). -- ecs_taskdefinition - fix idempotency (https://github.com/ansible-collections/community.aws/pull/574). diff --git a/changelogs/fragments/586-elb-renames.yml b/changelogs/fragments/586-elb-renames.yml deleted file mode 100644 index 0b799f0c0f6..00000000000 --- a/changelogs/fragments/586-elb-renames.yml +++ /dev/null @@ -1,8 +0,0 @@ -minor_changes: -- elb_instance - make elb_instance idempotent when deregistering instances. Merged from ec2_elb U(https://github.com/ansible/ansible/pull/31660). -deprecated_features: -- ec2_elb - the ``ec2_elb`` module has been removed and redirected to the ``elb_instance`` module which functions identically. - The original ``ec2_elb`` name is now deprecated and will be removed in release 3.0.0 (https://github.com/ansible-collections/community.aws/pull/586). -- ec2_elb_info - the boto based ``ec2_elb_info`` module has been deprecated in favour of the boto3 based ``elb_classic_lb_info`` module. - The ``ec2_elb_info`` module will be removed in release 3.0.0 (https://github.com/ansible-collections/community.aws/pull/586). -- elb_classic_lb - the ``elb_classic_lb`` module has been removed and redirected to the ``amazon.aws.ec2_elb_lb`` module which functions identically. diff --git a/changelogs/fragments/592-sqs_queue-idempotent.yml b/changelogs/fragments/592-sqs_queue-idempotent.yml deleted file mode 100644 index 94bd5ef2388..00000000000 --- a/changelogs/fragments/592-sqs_queue-idempotent.yml +++ /dev/null @@ -1,2 +0,0 @@ -bugfixes: -- sqs_queue - fix queue attribute comparison to make module idempotent (https://github.com/ansible-collections/community.aws/pull/592). diff --git a/changelogs/fragments/600-ecs-task-defination-env-file-validations.yml b/changelogs/fragments/600-ecs-task-defination-env-file-validations.yml deleted file mode 100644 index e9186e00354..00000000000 --- a/changelogs/fragments/600-ecs-task-defination-env-file-validations.yml +++ /dev/null @@ -1,2 +0,0 @@ -bugfixes: -- ecs_taskdefinition - fix typo in ecs task defination for env file validations (https://github.com/ansible-collections/community.aws/pull/600). diff --git a/changelogs/fragments/614-ec2_vpc_peer-tagging.yml b/changelogs/fragments/614-ec2_vpc_peer-tagging.yml deleted file mode 100644 index 1e76f6b86ab..00000000000 --- a/changelogs/fragments/614-ec2_vpc_peer-tagging.yml +++ /dev/null @@ -1,4 +0,0 @@ -bugfixes: -- ec2_vpc_peer - automatically retry when attempting to tag freshly created peering connections (https://github.com/ansible-collections/community.aws/pull/614). -minor_changes: -- ec2_vpc_peer - use shared code for tagging peering connections (https://github.com/ansible-collections/community.aws/pull/614). diff --git a/changelogs/fragments/616-ec2_vpc_route_table-tagging.yml b/changelogs/fragments/616-ec2_vpc_route_table-tagging.yml deleted file mode 100644 index 44ff49b8b38..00000000000 --- a/changelogs/fragments/616-ec2_vpc_route_table-tagging.yml +++ /dev/null @@ -1,4 +0,0 @@ -bugfixes: -- ec2_vpc_route_table - automatically retry when attempting to modify freshly created route tables (https://github.com/ansible-collections/community.aws/pull/616). -minor_changes: -- ec2_vpc_route_table - use shared code for tagging route tables (https://github.com/ansible-collections/community.aws/pull/616). diff --git a/changelogs/fragments/629-imports-cleanup.yml b/changelogs/fragments/629-imports-cleanup.yml deleted file mode 100644 index 211aea45988..00000000000 --- a/changelogs/fragments/629-imports-cleanup.yml +++ /dev/null @@ -1,2 +0,0 @@ -minor_changes: -- various community.aws modules - remove unused imports (https://github.com/ansible-collections/community.aws/pull/629) diff --git a/changelogs/fragments/648-kms_info.yml b/changelogs/fragments/648-kms_info.yml deleted file mode 100644 index 8589c07cf4c..00000000000 --- a/changelogs/fragments/648-kms_info.yml +++ /dev/null @@ -1,4 +0,0 @@ -minor_changes: -- kms_info - added a new ``keys_attr`` parameter to continue returning the key details in the ``keys`` attribute as well as the ``kms_keys`` attribute (https://github.com/ansible-collections/community.aws/pull/648). -breaking_changes: -- kms_info - key details are now returned in the ``kms_keys`` attribute rather than the ``keys`` attribute (https://github.com/ansible-collections/community.aws/pull/648). diff --git a/changelogs/fragments/659-checkmode.yml b/changelogs/fragments/659-checkmode.yml deleted file mode 100644 index dc9c541bb21..00000000000 --- a/changelogs/fragments/659-checkmode.yml +++ /dev/null @@ -1,10 +0,0 @@ -minor_changes: -- aws_sgw_info - ensure module runs in check_mode (https://github.com/ansible-collections/community.aws/issues/659). -- ec2_asg_info - ensure module runs in check_mode (https://github.com/ansible-collections/community.aws/issues/659). -- ec2_lc_info - ensure module runs in check_mode (https://github.com/ansible-collections/community.aws/issues/659). -- iam_mfa_device_info - ensure module runs in check_mode (https://github.com/ansible-collections/community.aws/issues/659). -- iam_server_certificate_info - ensure module runs in check_mode (https://github.com/ansible-collections/community.aws/issues/659). -- wafv2_resources_info - ensure module runs in check_mode (https://github.com/ansible-collections/community.aws/issues/659). -- wafv2_web_acl_info - ensure module runs in check_mode (https://github.com/ansible-collections/community.aws/issues/659). -- cloudformation_exports_info - ensure module runs in check_mode (https://github.com/ansible-collections/community.aws/issues/659). -- cloudfront_info - ensure module runs in check_mode (https://github.com/ansible-collections/community.aws/issues/659). diff --git a/changelogs/fragments/663-deprecate-rds.yml b/changelogs/fragments/663-deprecate-rds.yml deleted file mode 100644 index 787a090903d..00000000000 --- a/changelogs/fragments/663-deprecate-rds.yml +++ /dev/null @@ -1,3 +0,0 @@ -deprecated_features: -- rds - the boto based ``rds`` module has been deprecated in favour of the boto3 based ``rds_instance`` module. - The ``rds`` module will be removed in release 3.0.0 (https://github.com/ansible-collections/community.aws/pull/663). diff --git a/changelogs/fragments/664-deprecate-iam.yml b/changelogs/fragments/664-deprecate-iam.yml deleted file mode 100644 index b3dcc3665c2..00000000000 --- a/changelogs/fragments/664-deprecate-iam.yml +++ /dev/null @@ -1,3 +0,0 @@ -deprecated_features: -- iam - the boto based ``iam`` module has been deprecated in favour of the boto3 based ``iam_user``, ``iam_group`` and ``iam_role`` modules. - The ``iam`` module will be removed in release 3.0.0 (https://github.com/ansible-collections/community.aws/pull/664). diff --git a/changelogs/fragments/675-boto3-minimums.yml b/changelogs/fragments/675-boto3-minimums.yml deleted file mode 100644 index cab26b0de61..00000000000 --- a/changelogs/fragments/675-boto3-minimums.yml +++ /dev/null @@ -1,26 +0,0 @@ -major_changes: -- community.aws collection - The community.aws collection has dropped support for ``botocore<1.18.0`` and ``boto3<1.15.0`` (https://github.com/ansible-collections/community.aws/pull/711). - Most modules will continue to work with older versions of the AWS SDK, however compatability with older versions of the SDK is not guaranteed and will not be tested. - When using older versions of the SDK a warning will be emitted by Ansible (https://github.com/ansible-collections/amazon.aws/pull/442). -minor_changes: -- aws_eks_cluster - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). -- cloudformation_stack_set - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). -- dynamodb_table - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). -- dynamodb_ttl - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). -- ec2_ami_copy - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). -- ec2_asg - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). -- ec2_launch_template - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). -- ec2_transit_gateway - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). -- ec2_transit_gateway_info - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). -- ec2_vpc_peer - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). -- ecs_ecr - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). -- ecs_service - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). -- ecs_task - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). -- ecs_taskdefinition - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). -- efs - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). -- efs_info - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). -- elb_target_group - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). -- iam_role - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). -- lambda - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). -- rds_instance - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). -- sqs_queue - Tests for compatability with older versions of the AWS SDKs have been removed (https://github.com/ansible-collections/community.aws/pull/675). diff --git a/changelogs/fragments/681-aws_secret-deletion-idempotency.yml b/changelogs/fragments/681-aws_secret-deletion-idempotency.yml deleted file mode 100644 index ac7910ef23b..00000000000 --- a/changelogs/fragments/681-aws_secret-deletion-idempotency.yml +++ /dev/null @@ -1,2 +0,0 @@ -bugfixes: -- aws_secret - fix deletion idempotency when not using instant deletion (https://github.com/ansible-collections/community.aws/pull/681). diff --git a/changelogs/fragments/682-aws_s3_bucket_info-botocore.yml b/changelogs/fragments/682-aws_s3_bucket_info-botocore.yml deleted file mode 100644 index 1577bd8d9a4..00000000000 --- a/changelogs/fragments/682-aws_s3_bucket_info-botocore.yml +++ /dev/null @@ -1,2 +0,0 @@ -minor_changes: -- aws_s3_bucket_info - added test for botocore>=1.18.11 when attempting to fetch bucket ownership controls (https://github.com/ansible-collections/community.aws/pull/682) diff --git a/changelogs/fragments/686-pylint.yml b/changelogs/fragments/686-pylint.yml deleted file mode 100644 index 43b91aaef88..00000000000 --- a/changelogs/fragments/686-pylint.yml +++ /dev/null @@ -1,4 +0,0 @@ -minor_changes: -- ecs_task - remove unused import (https://github.com/ansible-collections/community.aws/pull/686). -- ec2_vpc_vgw - fix arguments-renamed pylint issue (https://github.com/ansible-collections/community.aws/pull/686). -- ec2_vpc_vpn - fix arguments-renamed pylint issue (https://github.com/ansible-collections/community.aws/pull/686). diff --git a/changelogs/fragments/688-pylint.yml b/changelogs/fragments/688-pylint.yml deleted file mode 100644 index 6008db9cf0f..00000000000 --- a/changelogs/fragments/688-pylint.yml +++ /dev/null @@ -1,10 +0,0 @@ -minor_changes: -- aws_kms_info - use a generator rather than list comprehension (https://github.com/ansible-collections/community.aws/pull/688). -- aws_ses_rule_set - use a generator rather than list comprehension (https://github.com/ansible-collections/community.aws/pull/688). -- cloudwatchevent_rule - use a generator rather than list comprehension (https://github.com/ansible-collections/community.aws/pull/688). -- elb_target_group - use a generator rather than list comprehension (https://github.com/ansible-collections/community.aws/pull/688). -- iam - use a generator rather than list comprehension (https://github.com/ansible-collections/community.aws/pull/688). -- iam_group - use a generator rather than list comprehension (https://github.com/ansible-collections/community.aws/pull/688). -- iam_role - use a generator rather than list comprehension (https://github.com/ansible-collections/community.aws/pull/688). -- iam_user - use a generator rather than list comprehension (https://github.com/ansible-collections/community.aws/pull/688). -- rds_instance - use a generator rather than list comprehension (https://github.com/ansible-collections/community.aws/pull/688). diff --git a/changelogs/fragments/692-s3_sync-individual-file-path.yml b/changelogs/fragments/692-s3_sync-individual-file-path.yml deleted file mode 100644 index 77b7ac80522..00000000000 --- a/changelogs/fragments/692-s3_sync-individual-file-path.yml +++ /dev/null @@ -1,2 +0,0 @@ -bugfixes: -- s3_sync - fix handling individual file path to upload a individual file to s3 bucket (https://github.com/ansible-collections/community.aws/pull/692). diff --git a/changelogs/fragments/697-iam_role-replace-UpdateRoleDescription-with-UpdateRole.yml b/changelogs/fragments/697-iam_role-replace-UpdateRoleDescription-with-UpdateRole.yml deleted file mode 100644 index a31b43451d9..00000000000 --- a/changelogs/fragments/697-iam_role-replace-UpdateRoleDescription-with-UpdateRole.yml +++ /dev/null @@ -1,2 +0,0 @@ -bugfixes: -- iam_role - Modified iam_role internal code to replace update_role_description with update_role (https://github.com/ansible-collections/community.aws/pull/697). diff --git a/changelogs/fragments/723-elasticache_subnet_group-boto3.yml b/changelogs/fragments/723-elasticache_subnet_group-boto3.yml deleted file mode 100644 index fc291737da9..00000000000 --- a/changelogs/fragments/723-elasticache_subnet_group-boto3.yml +++ /dev/null @@ -1,4 +0,0 @@ -minor_changes: -- elasticache_subnet_group - module migrated to boto3 AWS SDK (https://github.com/ansible-collections/community.aws/pull/723). -- elasticache_subnet_group - add return values (https://github.com/ansible-collections/community.aws/pull/723). -- elasticache_subnet_group - add support for check_mode (https://github.com/ansible-collections/community.aws/pull/723). diff --git a/changelogs/fragments/deprecate_ec2_inv_script.yml b/changelogs/fragments/deprecate_ec2_inv_script.yml deleted file mode 100644 index b0cc461ee58..00000000000 --- a/changelogs/fragments/deprecate_ec2_inv_script.yml +++ /dev/null @@ -1,2 +0,0 @@ -deprecated_features: -- script_inventory_ec2 - The ec2.py inventory script is being moved to a new repository. The script can now be downloaded from https://github.com/ansible-community/contrib-scripts/blob/main/inventory/ec2.py and will be removed from this collection in the 3.0 release. We recommend migrating from the script to the `amazon.aws.ec2` inventory plugin. diff --git a/changelogs/fragments/migrate_ec2_instance.yml b/changelogs/fragments/migrate_ec2_instance.yml deleted file mode 100644 index fb7c0fadfe7..00000000000 --- a/changelogs/fragments/migrate_ec2_instance.yml +++ /dev/null @@ -1,3 +0,0 @@ -breaking_changes: - - ec2_instance - The module has been migrated to the ``amazon.aws`` collection. Playbooks using the Fully Qualified Collection Name for this module should be updated to use ``amazon.aws.ec2_instance``. - - ec2_instance_info - The module has been migrated to the ``amazon.aws`` collection. Playbooks using the Fully Qualified Collection Name for this module should be updated to use ``amazon.aws.ec2_instance_info``. diff --git a/changelogs/fragments/migrate_ec2_vpc_endpoint.yml b/changelogs/fragments/migrate_ec2_vpc_endpoint.yml deleted file mode 100644 index 9b10b55a905..00000000000 --- a/changelogs/fragments/migrate_ec2_vpc_endpoint.yml +++ /dev/null @@ -1,13 +0,0 @@ -breaking_changes: -- ec2_vpc_endpoint_facts - The module has been migrated from the ``community.aws`` - collection. Playbooks using the Fully Qualified Collection Name for this module - should be updated to use ``amazon.aws.ec2_vpc_endpoint_info``. -- ec2_vpc_endpoint - The module has been migrated from the ``community.aws`` collection. - Playbooks using the Fully Qualified Collection Name for this module should be updated - to use ``amazon.aws.ec2_vpc_endpoint``. -- ec2_vpc_endpoint_info - The module has been migrated from the ``community.aws`` - collection. Playbooks using the Fully Qualified Collection Name for this module - should be updated to use ``amazon.aws.ec2_vpc_endpoint_info``. -- ec2_vpc_endpoint_service_info - The module has been migrated from the ``community.aws`` - collection. Playbooks using the Fully Qualified Collection Name for this module - should be updated to use ``amazon.aws.ec2_vpc_endpoint_service_info``. diff --git a/changelogs/fragments/migrate_ec2_vpc_igw.yml b/changelogs/fragments/migrate_ec2_vpc_igw.yml deleted file mode 100644 index 6ab3da37409..00000000000 --- a/changelogs/fragments/migrate_ec2_vpc_igw.yml +++ /dev/null @@ -1,10 +0,0 @@ -breaking_changes: -- ec2_vpc_igw_facts - The module has been migrated from the ``community.aws`` collection. - Playbooks using the Fully Qualified Collection Name for this module should be updated - to use ``amazon.aws.ec2_vpc_igw_info``. -- ec2_vpc_igw - The module has been migrated from the ``community.aws`` collection. - Playbooks using the Fully Qualified Collection Name for this module should be updated - to use ``amazon.aws.ec2_vpc_igw``. -- ec2_vpc_igw_info - The module has been migrated from the ``community.aws`` collection. - Playbooks using the Fully Qualified Collection Name for this module should be updated - to use ``amazon.aws.ec2_vpc_igw_info``. diff --git a/changelogs/fragments/migrate_ec2_vpc_nat_gateway.yml b/changelogs/fragments/migrate_ec2_vpc_nat_gateway.yml deleted file mode 100644 index 678e30e87cd..00000000000 --- a/changelogs/fragments/migrate_ec2_vpc_nat_gateway.yml +++ /dev/null @@ -1,10 +0,0 @@ -breaking_changes: -- ec2_vpc_nat_gateway_facts - The module has been migrated from the ``community.aws`` - collection. Playbooks using the Fully Qualified Collection Name for this module - should be updated to use ``amazon.aws.ec2_vpc_nat_gateway_info``. -- ec2_vpc_nat_gateway - The module has been migrated from the ``community.aws`` collection. - Playbooks using the Fully Qualified Collection Name for this module should be updated - to use ``amazon.aws.ec2_vpc_nat_gateway``. -- ec2_vpc_nat_gateway_info - The module has been migrated from the ``community.aws`` - collection. Playbooks using the Fully Qualified Collection Name for this module - should be updated to use ``amazon.aws.ec2_vpc_nat_gateway_info``. diff --git a/changelogs/fragments/rename-connection-retries.yml b/changelogs/fragments/rename-connection-retries.yml deleted file mode 100644 index 32cc97d3b9b..00000000000 --- a/changelogs/fragments/rename-connection-retries.yml +++ /dev/null @@ -1,2 +0,0 @@ -bugfixes: - - aws_ssm - rename ``retries`` to ``reconnection_retries`` to avoid conflict with task retries diff --git a/changelogs/fragments/sns_topic_type.yml b/changelogs/fragments/sns_topic_type.yml deleted file mode 100644 index 3c57bb3be36..00000000000 --- a/changelogs/fragments/sns_topic_type.yml +++ /dev/null @@ -1,2 +0,0 @@ -minor_changes: - - sns_topic - Added ``topic_type`` parameter to select type of SNS topic (either FIFO or Standard) (https://github.com/ansible-collections/community.aws/pull/599). diff --git a/docs/community.aws.aws_acm_info_module.rst b/docs/community.aws.aws_acm_info_module.rst index 45d16ff9e5e..c604a405734 100644 --- a/docs/community.aws.aws_acm_info_module.rst +++ b/docs/community.aws.aws_acm_info_module.rst @@ -27,9 +27,9 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- boto -- boto3 -- python >= 2.6 +- python >= 3.6 +- boto3 >= 1.15.0 +- botocore >= 1.18.0 Parameters @@ -55,7 +55,7 @@ Parameters
AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.keys
attribute as well as the kms_keys
attribute.keys
attribute conflicts with the builtin keys() method on dictionaries and as such has been deprecated.3.0.0
this parameter will do nothing, and after version 4.0.0
this parameter will be removed.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.Parameter | +Choices/Defaults | +Comments | +||
---|---|---|---|---|
+
+ authentication
+
+
+ dictionary
+
+ |
+ + | +
+ Includes all client authentication related information.
+ Effective only for new cluster and can not be updated.
+ |
+ ||
+ |
+
+ sasl_scram
+
+
+ boolean
+
+ |
+
+
|
+
+ SASL/SCRAM authentication is enabled or not.
+ |
+ |
+ |
+
+ tls_ca_arn
+
+
+ list
+ / elements=string
+
+ |
+ + | +
+ List of ACM Certificate Authority ARNs.
+ |
+ |
+
+ aws_access_key
+
+
+ string
+
+ |
+ + | +
+ AWS access key . If not set then the value of the AWS_ACCESS_KEY_ID , AWS_ACCESS_KEY or EC2_ACCESS_KEY environment variable is used.If profile is set this parameter is ignored.
+ Passing the aws_access_key and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
+ aliases: ec2_access_key, access_key |
+ ||
+
+ aws_ca_bundle
+
+
+ path
+
+ |
+ + | +
+ The location of a CA Bundle to use when validating SSL certificates.
+ Not used by boto 2 based modules.
+ Note: The CA Bundle is read 'module' side and may need to be explicitly copied from the controller if not run locally.
+ |
+ ||
+
+ aws_config
+
+
+ dictionary
+
+ |
+ + | +
+ A dictionary to modify the botocore configuration.
+ Parameters can be found at https://botocore.amazonaws.com/v1/documentation/api/latest/reference/config.html#botocore.config.Config.
+ Only the 'user_agent' key is used for boto modules. See http://boto.cloudhackers.com/en/latest/boto_config_tut.html#boto for more boto configuration.
+ |
+ ||
+
+ aws_secret_key
+
+
+ string
+
+ |
+ + | +
+ AWS secret key . If not set then the value of the AWS_SECRET_ACCESS_KEY , AWS_SECRET_KEY , or EC2_SECRET_KEY environment variable is used.If profile is set this parameter is ignored.
+ Passing the aws_secret_key and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
+ aliases: ec2_secret_key, secret_key |
+ ||
+
+ configuration_arn
+
+
+ string
+
+ |
+ + | +
+ ARN of the configuration to use.
+ This parameter is required when state=present.
+ |
+ ||
+
+ configuration_revision
+
+
+ integer
+
+ |
+ + | +
+ The revision of the configuration to use.
+ This parameter is required when state=present.
+ |
+ ||
+
+ debug_botocore_endpoint_logs
+
+
+ boolean
+
+ |
+
+
|
+
+ Use a botocore.endpoint logger to parse the unique (rather than total) "resource:action" API calls made during a task, outputing the set to the resource_actions key in the task results. Use the aws_resource_action callback to output to total list made during a playbook. The ANSIBLE_DEBUG_BOTOCORE_LOGS environment variable may also be used.
+ |
+ ||
+
+ ebs_volume_size
+
+
+ integer
+
+ |
+
+ Default: 100
+ |
+
+ The size in GiB of the EBS volume for the data drive on each broker node.
+ |
+ ||
+
+ ec2_url
+
+
+ string
+
+ |
+ + | +
+ URL to use to connect to EC2 or your Eucalyptus cloud (by default the module will use EC2 endpoints). Ignored for modules where region is required. Must be specified for all other modules if region is not used. If not set then the value of the EC2_URL environment variable, if any, is used.
+ aliases: aws_endpoint_url, endpoint_url |
+ ||
+
+ encryption
+
+
+ dictionary
+
+ |
+ + | +
+ Includes all encryption-related information.
+ Effective only for new cluster and can not be updated.
+ |
+ ||
+ |
+
+ in_transit
+
+
+ dictionary
+
+ |
+ + | +
+ The details for encryption in transit.
+ |
+ |
+ | + |
+
+ client_broker
+
+
+ string
+
+ |
+
+
|
+
+ Indicates the encryption setting for data in transit between clients and brokers. The following are the possible values. TLS means that client-broker communication is enabled with TLS only. TLS_PLAINTEXT means that client-broker communication is enabled for both TLS-encrypted, as well as plaintext data. PLAINTEXT means that client-broker communication is enabled in plaintext only.
+ |
+
+ | + |
+
+ in_cluster
+
+
+ boolean
+
+ |
+
+
|
+
+ When set to true, it indicates that data communication among the broker nodes of the cluster is encrypted. When set to false, the communication happens in plaintext.
+ |
+
+ |
+
+ kms_key_id
+
+
+ string
+
+ |
+
+ Default: null
+ |
+
+ The ARN of the AWS KMS key for encrypting data at rest. If you don't specify a KMS key, MSK creates one for you and uses it.
+ |
+ |
+
+ enhanced_monitoring
+
+
+ string
+
+ |
+
+
|
+
+ Specifies the level of monitoring for the MSK cluster.
+ |
+ ||
+
+ instance_type
+
+
+ string
+
+ |
+
+
|
+
+ The type of Amazon EC2 instances to use for Kafka brokers.
+ Update operation requires botocore version >= 1.19.58.
+ |
+ ||
+
+ logging
+
+
+ dictionary
+
+ |
+ + | +
+ Logging configuration.
+ |
+ ||
+ |
+
+ cloudwatch
+
+
+ dictionary
+
+ |
+ + | +
+ Details of the CloudWatch Logs destination for broker logs.
+ |
+ |
+ | + |
+
+ enabled
+
+
+ boolean
+
+ |
+
+
|
+
+ Specifies whether broker logs get sent to the specified CloudWatch Logs destination.
+ |
+
+ | + |
+
+ log_group
+
+
+ string
+
+ |
+ + | +
+ The CloudWatch log group that is the destination for broker logs.
+ |
+
+ |
+
+ firehose
+
+
+ dictionary
+
+ |
+ + | +
+ Details of the Kinesis Data Firehose delivery stream that is the destination for broker logs.
+ |
+ |
+ | + |
+
+ delivery_stream
+
+
+ string
+
+ |
+ + | +
+ The Kinesis Data Firehose delivery stream that is the destination for broker logs.
+ |
+
+ | + |
+
+ enabled
+
+
+ boolean
+
+ |
+
+
|
+
+ Specifies whether broker logs get send to the specified Kinesis Data Firehose delivery stream.
+ |
+
+ |
+
+ s3
+
+
+ dictionary
+
+ |
+ + | +
+ Details of the Amazon S3 destination for broker logs.
+ |
+ |
+ | + |
+
+ bucket
+
+
+ string
+
+ |
+ + | +
+ The name of the S3 bucket that is the destination for broker logs.
+ |
+
+ | + |
+
+ enabled
+
+
+ boolean
+
+ |
+
+
|
+
+ Specifies whether broker logs get sent to the specified Amazon S3 destination.
+ |
+
+ | + |
+
+ prefix
+
+
+ string
+
+ |
+ + | +
+ The S3 prefix that is the destination for broker logs.
+ |
+
+
+ name
+
+
+ string
+ / required
+
+ |
+ + | +
+ The name of the cluster.
+ |
+ ||
+
+ nodes
+
+
+ integer
+
+ |
+
+ Default: 3
+ |
+
+ The number of broker nodes in the cluster. Should be greater or equal to two.
+ |
+ ||
+
+ open_monitoring
+
+
+ dictionary
+
+ |
+ + | +
+ The settings for open monitoring.
+ |
+ ||
+ |
+
+ jmx_exporter
+
+
+ boolean
+
+ |
+
+
|
+
+ Indicates whether you want to enable or disable the JMX Exporter.
+ |
+ |
+ |
+
+ node_exporter
+
+
+ boolean
+
+ |
+
+
|
+
+ Indicates whether you want to enable or disable the Node Exporter.
+ |
+ |
+
+ profile
+
+
+ string
+
+ |
+ + | +
+ Using profile will override aws_access_key, aws_secret_key and security_token and support for passing them at the same time as profile has been deprecated.
+ aws_access_key, aws_secret_key and security_token will be made mutually exclusive with profile after 2022-06-01.
+ aliases: aws_profile |
+ ||
+
+ purge_tags
+
+
+ boolean
+
+ |
+
+
|
+
+ Remove tags not listed in tags when tags is specified.
+ |
+ ||
+
+ region
+
+
+ string
+
+ |
+ + | +
+ The AWS region to use. If not specified then the value of the AWS_REGION or EC2_REGION environment variable, if any, is used. See http://docs.aws.amazon.com/general/latest/gr/rande.html#ec2_region
+ aliases: aws_region, ec2_region |
+ ||
+
+ security_groups
+
+
+ list
+ / elements=string
+
+ |
+ + | +
+ The AWS security groups to associate with the elastic network interfaces in order to specify who can connect to and communicate with the Amazon MSK cluster. If you don't specify a security group, Amazon MSK uses the default security group associated with the VPC.
+ |
+ ||
+
+ security_token
+
+
+ string
+
+ |
+ + | +
+ AWS STS security token . If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.If profile is set this parameter is ignored.
+ Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
+ aliases: aws_security_token, access_token |
+ ||
+
+ state
+
+
+ string
+
+ |
+
+
|
+
+ Create (
+ present ) or delete (absent ) cluster. |
+ ||
+
+ subnets
+
+
+ list
+ / elements=string
+
+ |
+ + | +
+ The list of subnets to connect to in the client virtual private cloud (VPC). AWS creates elastic network interfaces inside these subnets. Client applications use elastic network interfaces to produce and consume data.
+ Client subnets can't be in Availability Zone us-east-1e.
+ This parameter is required when state=present.
+ |
+ ||
+
+ tags
+
+
+ dictionary
+
+ |
+ + | +
+ Tag dictionary to apply to the cluster.
+ |
+ ||
+
+ validate_certs
+
+
+ boolean
+
+ |
+
+
|
+
+ When set to "no", SSL certificates will not be validated for communication with the AWS APIs.
+ |
+ ||
+
+ version
+
+
+ string
+
+ |
+ + | +
+ The version of Apache Kafka.
+ This version should exist in given configuration.
+ This parameter is required when state=present.
+ Update operation requires botocore version >= 1.16.19.
+ |
+ ||
+
+ wait
+
+
+ boolean
+
+ |
+
+
|
+
+ Whether to wait for the cluster to be available or deleted.
+ |
+ ||
+
+ wait_timeout
+
+
+ integer
+
+ |
+
+ Default: 3600
+ |
+
+ How many seconds to wait. Cluster creation can take up to 20-30 minutes.
+ |
+
Parameter | +Choices/Defaults | +Comments | +
---|---|---|
+
+ aws_access_key
+
+
+ string
+
+ |
+ + | +
+ AWS access key . If not set then the value of the AWS_ACCESS_KEY_ID , AWS_ACCESS_KEY or EC2_ACCESS_KEY environment variable is used.If profile is set this parameter is ignored.
+ Passing the aws_access_key and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
+ aliases: ec2_access_key, access_key |
+
+
+ aws_ca_bundle
+
+
+ path
+
+ |
+ + | +
+ The location of a CA Bundle to use when validating SSL certificates.
+ Not used by boto 2 based modules.
+ Note: The CA Bundle is read 'module' side and may need to be explicitly copied from the controller if not run locally.
+ |
+
+
+ aws_config
+
+
+ dictionary
+
+ |
+ + | +
+ A dictionary to modify the botocore configuration.
+ Parameters can be found at https://botocore.amazonaws.com/v1/documentation/api/latest/reference/config.html#botocore.config.Config.
+ Only the 'user_agent' key is used for boto modules. See http://boto.cloudhackers.com/en/latest/boto_config_tut.html#boto for more boto configuration.
+ |
+
+
+ aws_secret_key
+
+
+ string
+
+ |
+ + | +
+ AWS secret key . If not set then the value of the AWS_SECRET_ACCESS_KEY , AWS_SECRET_KEY , or EC2_SECRET_KEY environment variable is used.If profile is set this parameter is ignored.
+ Passing the aws_secret_key and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
+ aliases: ec2_secret_key, secret_key |
+
+
+ config
+
+
+ dictionary
+
+ |
+ + | +
+ Contents of the server.properties file.
+ aliases: configuration |
+
+
+ debug_botocore_endpoint_logs
+
+
+ boolean
+
+ |
+
+
|
+
+ Use a botocore.endpoint logger to parse the unique (rather than total) "resource:action" API calls made during a task, outputing the set to the resource_actions key in the task results. Use the aws_resource_action callback to output to total list made during a playbook. The ANSIBLE_DEBUG_BOTOCORE_LOGS environment variable may also be used.
+ |
+
+
+ description
+
+
+ string
+
+ |
+ + | +
+ The description of the configuration.
+ |
+
+
+ ec2_url
+
+
+ string
+
+ |
+ + | +
+ URL to use to connect to EC2 or your Eucalyptus cloud (by default the module will use EC2 endpoints). Ignored for modules where region is required. Must be specified for all other modules if region is not used. If not set then the value of the EC2_URL environment variable, if any, is used.
+ aliases: aws_endpoint_url, endpoint_url |
+
+
+ kafka_versions
+
+
+ list
+ / elements=string
+
+ |
+ + | +
+ The versions of Apache Kafka with which you can use this MSK configuration.
+ Required when state=present.
+ |
+
+
+ name
+
+
+ string
+ / required
+
+ |
+ + | +
+ The name of the configuration.
+ |
+
+
+ profile
+
+
+ string
+
+ |
+ + | +
+ Using profile will override aws_access_key, aws_secret_key and security_token and support for passing them at the same time as profile has been deprecated.
+ aws_access_key, aws_secret_key and security_token will be made mutually exclusive with profile after 2022-06-01.
+ aliases: aws_profile |
+
+
+ region
+
+
+ string
+
+ |
+ + | +
+ The AWS region to use. If not specified then the value of the AWS_REGION or EC2_REGION environment variable, if any, is used. See http://docs.aws.amazon.com/general/latest/gr/rande.html#ec2_region
+ aliases: aws_region, ec2_region |
+
+
+ security_token
+
+
+ string
+
+ |
+ + | +
+ AWS STS security token . If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.If profile is set this parameter is ignored.
+ Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
+ aliases: aws_security_token, access_token |
+
+
+ state
+
+
+ string
+
+ |
+
+
|
+
+ Create (
+ present ) or delete (absent ) cluster configuration. |
+
+
+ validate_certs
+
+
+ boolean
+
+ |
+
+
|
+
+ When set to "no", SSL certificates will not be validated for communication with the AWS APIs.
+ |
+
AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.origin-access-identity/cloudfront/OID_ID
.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.true
, images are scanned for known vulnerabilities after being pushed to the repository.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.Parameter | -Choices/Defaults | -Comments | -
---|---|---|
-
- access_logs
-
-
- dictionary
-
- |
- - | -
- An associative array of access logs configuration settings (see example).
- |
-
-
- aws_access_key
-
-
- string
-
- |
- - | -
- AWS access key. If not set then the value of the AWS_ACCESS_KEY_ID, AWS_ACCESS_KEY or EC2_ACCESS_KEY environment variable is used.
- If profile is set this parameter is ignored.
- Passing the aws_access_key and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
- aliases: ec2_access_key, access_key |
-
-
- aws_ca_bundle
-
-
- path
-
- |
- - | -
- The location of a CA Bundle to use when validating SSL certificates.
- Only used for boto3 based modules.
- Note: The CA Bundle is read 'module' side and may need to be explicitly copied from the controller if not run locally.
- |
-
-
- aws_config
-
-
- dictionary
-
- |
- - | -
- A dictionary to modify the botocore configuration.
- Parameters can be found at https://botocore.amazonaws.com/v1/documentation/api/latest/reference/config.html#botocore.config.Config.
- Only the 'user_agent' key is used for boto modules. See http://boto.cloudhackers.com/en/latest/boto_config_tut.html#boto for more boto configuration.
- |
-
-
- aws_secret_key
-
-
- string
-
- |
- - | -
- AWS secret key. If not set then the value of the AWS_SECRET_ACCESS_KEY, AWS_SECRET_KEY, or EC2_SECRET_KEY environment variable is used.
- If profile is set this parameter is ignored.
- Passing the aws_secret_key and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
- aliases: ec2_secret_key, secret_key |
-
-
- connection_draining_timeout
-
-
- integer
-
- |
- - | -
- Wait a specified timeout allowing connections to drain before terminating an instance.
- |
-
-
- cross_az_load_balancing
-
-
- boolean
-
- |
-
-
|
-
- Distribute load across all configured Availability Zones.
- Defaults to
- false . |
-
-
- debug_botocore_endpoint_logs
-
-
- boolean
-
- |
-
-
|
-
- Use a botocore.endpoint logger to parse the unique (rather than total) "resource:action" API calls made during a task, outputing the set to the resource_actions key in the task results. Use the aws_resource_action callback to output to total list made during a playbook. The ANSIBLE_DEBUG_BOTOCORE_LOGS environment variable may also be used.
- |
-
-
- ec2_url
-
-
- string
-
- |
- - | -
- Url to use to connect to EC2 or your Eucalyptus cloud (by default the module will use EC2 endpoints). Ignored for modules where region is required. Must be specified for all other modules if region is not used. If not set then the value of the EC2_URL environment variable, if any, is used.
- aliases: aws_endpoint_url, endpoint_url |
-
-
- health_check
-
-
- dictionary
-
- |
- - | -
- An associative array of health check configuration settings (see example).
- |
-
-
- idle_timeout
-
-
- integer
-
- |
- - | -
- ELB connections from clients and to servers are timed out after this amount of time.
- |
-
-
- instance_ids
-
-
- list
- / elements=string
-
- |
- - | -
- List of instance ids to attach to this ELB.
- |
-
-
- listeners
-
-
- list
- / elements=dictionary
-
- |
- - | -
- List of ports/protocols for this ELB to listen on (see example).
- |
-
-
- name
-
-
- string
- / required
-
- |
- - | -
- The name of the ELB.
- |
-
-
- profile
-
-
- string
-
- |
- - | -
- Uses a boto profile. Only works with boto >= 2.24.0.
- Using profile will override aws_access_key, aws_secret_key and security_token and support for passing them at the same time as profile has been deprecated.
- aws_access_key, aws_secret_key and security_token will be made mutually exclusive with profile after 2022-06-01.
- aliases: aws_profile |
-
-
- purge_instance_ids
-
-
- boolean
-
- |
-
-
|
-
- Purge existing instance ids on ELB that are not found in instance_ids.
- |
-
-
- purge_listeners
-
-
- boolean
-
- |
-
-
|
-
- Purge existing listeners on ELB that are not found in listeners.
- |
-
-
- purge_subnets
-
-
- boolean
-
- |
-
-
|
-
- Purge existing subnets on ELB that are not found in subnets.
- |
-
-
- purge_zones
-
-
- boolean
-
- |
-
-
|
-
- Purge existing availability zones on ELB that are not found in zones.
- |
-
-
- region
-
-
- string
-
- |
- - | -
- The AWS region to use. If not specified then the value of the AWS_REGION or EC2_REGION environment variable, if any, is used. See http://docs.aws.amazon.com/general/latest/gr/rande.html#ec2_region
- aliases: aws_region, ec2_region |
-
-
- scheme
-
-
- string
-
- |
-
-
|
-
- The scheme to use when creating the ELB.
- For a private VPC-visible ELB use
- internal .If you choose to update your scheme with a different value the ELB will be destroyed and recreated. To update scheme you must set wait=true.
- |
-
-
- security_group_ids
-
-
- list
- / elements=string
-
- |
- - | -
- A list of security groups to apply to the ELB.
- |
-
-
- security_group_names
-
-
- list
- / elements=string
-
- |
- - | -
- A list of security group names to apply to the ELB.
- |
-
-
- security_token
-
-
- string
-
- |
- - | -
- AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
- If profile is set this parameter is ignored.
- Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
- aliases: aws_security_token, access_token |
-
-
- state
-
-
- string
- / required
-
- |
-
-
|
-
- Create or destroy the ELB.
- |
-
-
- stickiness
-
-
- dictionary
-
- |
- - | -
- An associative array of stickiness policy settings. Policy will be applied to all listeners (see example).
- |
-
-
- subnets
-
-
- list
- / elements=string
-
- |
- - | -
- A list of VPC subnets to use when creating ELB. Zones should be empty if using this.
- |
-
-
- tags
-
-
- dictionary
-
- |
- - | -
- An associative array of tags. To delete all tags, supply an empty dict.
- |
-
-
- validate_certs
-
-
- boolean
-
- |
-
-
|
-
- When set to
- false , SSL certificates will not be validated for boto versions >= 2.6.0. |
-
-
- wait
-
-
- boolean
-
- |
-
-
|
-
- When specified, Ansible will check the status of the load balancer to ensure it has been successfully removed from AWS.
- |
-
-
- wait_timeout
-
-
- integer
-
- |
-
- Default: 60
- |
-
- Used in conjunction with wait. Number of seconds to wait for the ELB to be terminated. A maximum of
- 600 seconds (10 minutes) is allowed. |
-
-
- zones
-
-
- list
- / elements=string
-
- |
- - | -
- List of availability zones to enable on this ELB.
- |
-
AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.false
.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.AWS access key
. If not set then the value of the AWS_ACCESS_KEY_ID
, AWS_ACCESS_KEY
or EC2_ACCESS_KEY
environment variable is used.AWS secret key
. If not set then the value of the AWS_SECRET_ACCESS_KEY
, AWS_SECRET_KEY
, or EC2_SECRET_KEY
environment variable is used.AWS STS security token
. If not set then the value of the AWS_SECURITY_TOKEN
or EC2_SECURITY_TOKEN
environment variable is used.