summaryrefslogtreecommitdiffstats
path: root/hacking/aws_config
diff options
context:
space:
mode:
authorsramakr <sramakr@gmail.com>2017-07-17 04:03:31 +0200
committerWill Thames <will@thames.id.au>2017-07-17 04:03:31 +0200
commitb980a5c02ae8af23719066631e49b67ff04d3884 (patch)
tree132f1c0470a0d66c809763c3530e39a092570b47 /hacking/aws_config
parentjunos implementation of net_lldp (#26872) (diff)
downloadansible-b980a5c02ae8af23719066631e49b67ff04d3884.tar.xz
ansible-b980a5c02ae8af23719066631e49b67ff04d3884.zip
Use Boto3 for ec2_group Fixes #23507 (#25340)
* Use Boto3 for ec2_group Currently boto doesn't support ipv6. To support ipv6 in ec2_group, we need boto3. boto3 has significant API changes, which caused more re-factoring for ec2_group module. Added additional integration test to test_ec2_group role. * Follow the standard for boto3 ansible Fixed imports. Use boto3 ansible exception with camel_dict_to_snake_dict. Refactored the call to authorize/revoke ingress and egress. * Removed dependancy with module ipaddress Added new parameter called cidr_ipv6 for specifying ipv6 addresses inline with how boto3 handles ipv6 addresses. * Updated integration test * Added ipv6 integration test for ec2_group * Set purge_rules to false for integration test * Fixed import statements Added example for ipv6. Removed defining HAS_BOTO3 variable and import HAS_BOTO3 from ec2. Cleaned up import statements. * Fixed exception handling * Add IAM permissions for ec2_group tests Missing AuthorizeSecurityGroupEgress necessary for latest tests * Wrapped botocore import in try/except block Import just botocore to be more similar to other modules
Diffstat (limited to 'hacking/aws_config')
-rw-r--r--hacking/aws_config/testing_policies/ec2-policy.json1
1 files changed, 1 insertions, 0 deletions
diff --git a/hacking/aws_config/testing_policies/ec2-policy.json b/hacking/aws_config/testing_policies/ec2-policy.json
index 099e78b159..5a47f1b7dc 100644
--- a/hacking/aws_config/testing_policies/ec2-policy.json
+++ b/hacking/aws_config/testing_policies/ec2-policy.json
@@ -35,6 +35,7 @@
"Effect": "Allow",
"Action": [
"ec2:AuthorizeSecurityGroupIngress",
+ "ec2:AuthorizeSecurityGroupEgress",
"ec2:CreateTags",
"ec2:DeleteRouteTable",
"ec2:DeleteSecurityGroup",