From 7b8b588461f4c57abc4c1a87867906a17754bd4c Mon Sep 17 00:00:00 2001 From: Markus Bergholz Date: Mon, 30 May 2022 15:18:16 +0200 Subject: [PATCH] community.aws 3.3.0 (#1180) community.aws 3.3.0 SUMMARY community.aws 3.3.0 release ISSUE TYPE Bugfix Pull Request Docs Pull Request Feature Pull Request New Module Pull Request COMPONENT NAME entire collection Reviewed-by: Mark Chappell Reviewed-by: Alina Buzachis --- CHANGELOG.rst | 49 ++ README.md | 7 +- changelogs/changelog.yaml | 70 +++ .../fragments/0000-ecs_taskdefinition_fix.yml | 4 - ...stance-stabilize-and-support-iam-roles.yml | 4 - .../1033-ec2_asg-check-mode-support.yml | 2 - ...52-aws_kms-stabilize-integration-tests.yml | 3 - ...iam_user-add-new-ret-val-handle-errors.yml | 5 - ...1077-s3_lifecycle-transition-days-zero.yml | 2 - ...ds_instance_snapshot-add-copy-snapshot.yml | 5 - ...iguration-is-complete-before-returning.yml | 2 - ...policy-update-docs-and-add-required_if.yml | 4 - ...ance-add-deletion_protection-parameter.yml | 2 - ...lambda-checkmode-fix-kms_key_arn-param.yml | 5 - ...ambda-checkmode-fix-update-return-docs.yml | 2 - .../1117-route53-add_geo_location_support.yml | 2 - .../1300-ecs_service-placementConstraints.yml | 2 - .../fragments/789-rds_instance_snapshot.yml | 4 - changelogs/fragments/967-dynamodb_table.yml | 2 - docs/community.aws.aws_acm_info_module.rst | 3 +- docs/community.aws.aws_acm_module.rst | 5 +- ...nity.aws.aws_api_gateway_domain_module.rst | 416 +++++++++++++++ docs/community.aws.aws_api_gateway_module.rst | 3 +- ....aws_application_scaling_policy_module.rst | 3 +- ...s.aws_batch_compute_environment_module.rst | 3 +- ...ty.aws.aws_batch_job_definition_module.rst | 5 +- ...mmunity.aws.aws_batch_job_queue_module.rst | 3 +- docs/community.aws.aws_codebuild_module.rst | 3 +- docs/community.aws.aws_codecommit_module.rst | 3 +- .../community.aws.aws_codepipeline_module.rst | 3 +- ...onfig_aggregation_authorization_module.rst | 3 +- ...unity.aws.aws_config_aggregator_module.rst | 3 +- ...aws.aws_config_delivery_channel_module.rst | 3 +- ...mmunity.aws.aws_config_recorder_module.rst | 3 +- docs/community.aws.aws_config_rule_module.rst | 9 +- ...rect_connect_confirm_connection_module.rst | 3 +- ...s.aws_direct_connect_connection_module.rst | 3 +- ....aws.aws_direct_connect_gateway_module.rst | 3 +- ..._connect_link_aggregation_group_module.rst | 3 +- ...irect_connect_virtual_interface_module.rst | 3 +- docs/community.aws.aws_eks_cluster_module.rst | 3 +- ...ty.aws.aws_elasticbeanstalk_app_module.rst | 3 +- ...mmunity.aws.aws_glue_connection_module.rst | 3 +- docs/community.aws.aws_glue_job_module.rst | 3 +- ...munity.aws.aws_inspector_target_module.rst | 3 +- docs/community.aws.aws_kms_info_module.rst | 26 +- docs/community.aws.aws_kms_module.rst | 43 +- docs/community.aws.aws_msk_cluster_module.rst | 3 +- docs/community.aws.aws_msk_config_module.rst | 3 +- docs/community.aws.aws_region_info_module.rst | 3 +- ...ommunity.aws.aws_s3_bucket_info_module.rst | 3 +- docs/community.aws.aws_s3_cors_module.rst | 3 +- docs/community.aws.aws_secret_module.rst | 5 +- .../community.aws.aws_ses_identity_module.rst | 3 +- ...ity.aws.aws_ses_identity_policy_module.rst | 3 +- .../community.aws.aws_ses_rule_set_module.rst | 3 +- docs/community.aws.aws_sgw_info_module.rst | 3 +- docs/community.aws.aws_ssm_connection.rst | 2 +- ...ity.aws.aws_ssm_parameter_store_module.rst | 3 +- ...nctions_state_machine_execution_module.rst | 3 +- ...ws_step_functions_state_machine_module.rst | 3 +- ...community.aws.aws_waf_condition_module.rst | 3 +- docs/community.aws.aws_waf_info_module.rst | 3 +- docs/community.aws.aws_waf_rule_module.rst | 5 +- docs/community.aws.aws_waf_web_acl_module.rst | 3 +- ...aws.cloudformation_exports_info_module.rst | 3 +- ...ty.aws.cloudformation_stack_set_module.rst | 3 +- ...ity.aws.cloudfront_distribution_module.rst | 4 +- docs/community.aws.cloudfront_info_module.rst | 3 +- ...ity.aws.cloudfront_invalidation_module.rst | 5 +- ...oudfront_origin_access_identity_module.rst | 3 +- ...udfront_response_headers_policy_module.rst | 3 +- docs/community.aws.cloudtrail_module.rst | 3 +- ...munity.aws.cloudwatchevent_rule_module.rst | 3 +- ...s.cloudwatchlogs_log_group_info_module.rst | 3 +- ...tchlogs_log_group_metric_filter_module.rst | 3 +- ...ty.aws.cloudwatchlogs_log_group_module.rst | 3 +- docs/community.aws.data_pipeline_module.rst | 3 +- docs/community.aws.dms_endpoint_module.rst | 3 +- ...ws.dms_replication_subnet_group_module.rst | 3 +- docs/community.aws.dynamodb_table_module.rst | 3 +- docs/community.aws.dynamodb_ttl_module.rst | 3 +- docs/community.aws.ec2_ami_copy_module.rst | 3 +- docs/community.aws.ec2_asg_info_module.rst | 3 +- ...s.ec2_asg_instance_refresh_info_module.rst | 3 +- ...ty.aws.ec2_asg_instance_refresh_module.rst | 3 +- ...nity.aws.ec2_asg_lifecycle_hook_module.rst | 3 +- docs/community.aws.ec2_asg_module.rst | 3 +- ...ty.aws.ec2_asg_scheduled_action_module.rst | 3 +- ...y.aws.ec2_customer_gateway_info_module.rst | 3 +- ...munity.aws.ec2_customer_gateway_module.rst | 3 +- docs/community.aws.ec2_eip_info_module.rst | 3 +- docs/community.aws.ec2_eip_module.rst | 3 +- ...mmunity.aws.ec2_launch_template_module.rst | 3 +- docs/community.aws.ec2_lc_find_module.rst | 3 +- docs/community.aws.ec2_lc_info_module.rst | 3 +- docs/community.aws.ec2_lc_module.rst | 3 +- .../community.aws.ec2_metric_alarm_module.rst | 3 +- ...ty.aws.ec2_placement_group_info_module.rst | 6 +- ...mmunity.aws.ec2_placement_group_module.rst | 3 +- ...ommunity.aws.ec2_scaling_policy_module.rst | 3 +- ...community.aws.ec2_snapshot_copy_module.rst | 3 +- ...ty.aws.ec2_transit_gateway_info_module.rst | 3 +- ...mmunity.aws.ec2_transit_gateway_module.rst | 3 +- ...ommunity.aws.ec2_vpc_egress_igw_module.rst | 3 +- ...community.aws.ec2_vpc_nacl_info_module.rst | 3 +- docs/community.aws.ec2_vpc_nacl_module.rst | 3 +- docs/community.aws.ec2_vpc_peer_module.rst | 3 +- ...munity.aws.ec2_vpc_peering_info_module.rst | 3 +- ...ty.aws.ec2_vpc_route_table_info_module.rst | 3 +- ...mmunity.aws.ec2_vpc_route_table_module.rst | 3 +- .../community.aws.ec2_vpc_vgw_info_module.rst | 3 +- docs/community.aws.ec2_vpc_vgw_module.rst | 3 +- .../community.aws.ec2_vpc_vpn_info_module.rst | 3 +- docs/community.aws.ec2_vpc_vpn_module.rst | 3 +- .../community.aws.ec2_win_password_module.rst | 3 +- docs/community.aws.ecs_attribute_module.rst | 3 +- docs/community.aws.ecs_cluster_module.rst | 3 +- docs/community.aws.ecs_ecr_module.rst | 3 +- .../community.aws.ecs_service_info_module.rst | 3 +- docs/community.aws.ecs_service_module.rst | 3 +- docs/community.aws.ecs_tag_module.rst | 3 +- docs/community.aws.ecs_task_module.rst | 3 +- ...ity.aws.ecs_taskdefinition_info_module.rst | 3 +- ...ommunity.aws.ecs_taskdefinition_module.rst | 92 +++- docs/community.aws.efs_info_module.rst | 3 +- docs/community.aws.efs_module.rst | 3 +- docs/community.aws.efs_tag_module.rst | 3 +- .../community.aws.elasticache_info_module.rst | 3 +- docs/community.aws.elasticache_module.rst | 3 +- ...aws.elasticache_parameter_group_module.rst | 3 +- ...munity.aws.elasticache_snapshot_module.rst | 3 +- ...ty.aws.elasticache_subnet_group_module.rst | 3 +- ...ity.aws.elb_application_lb_info_module.rst | 3 +- ...ommunity.aws.elb_application_lb_module.rst | 5 +- ...mmunity.aws.elb_classic_lb_info_module.rst | 3 +- docs/community.aws.elb_instance_module.rst | 3 +- docs/community.aws.elb_network_lb_module.rst | 3 +- ...unity.aws.elb_target_group_info_module.rst | 3 +- .../community.aws.elb_target_group_module.rst | 3 +- docs/community.aws.elb_target_info_module.rst | 3 +- docs/community.aws.elb_target_module.rst | 3 +- docs/community.aws.execute_lambda_module.rst | 26 +- ...mmunity.aws.iam_access_key_info_module.rst | 3 +- docs/community.aws.iam_access_key_module.rst | 3 +- docs/community.aws.iam_group_module.rst | 3 +- ...ommunity.aws.iam_managed_policy_module.rst | 3 +- ...mmunity.aws.iam_mfa_device_info_module.rst | 3 +- ...mmunity.aws.iam_password_policy_module.rst | 3 +- docs/community.aws.iam_policy_info_module.rst | 3 +- docs/community.aws.iam_policy_module.rst | 43 +- docs/community.aws.iam_role_info_module.rst | 3 +- docs/community.aws.iam_role_module.rst | 3 +- ...mmunity.aws.iam_saml_federation_module.rst | 3 +- ...aws.iam_server_certificate_info_module.rst | 3 +- ...nity.aws.iam_server_certificate_module.rst | 3 +- docs/community.aws.iam_user_info_module.rst | 3 +- docs/community.aws.iam_user_module.rst | 9 +- docs/community.aws.kinesis_stream_module.rst | 3 +- docs/community.aws.lambda_alias_module.rst | 3 +- docs/community.aws.lambda_event_module.rst | 3 +- docs/community.aws.lambda_info_module.rst | 3 +- docs/community.aws.lambda_module.rst | 486 +++++++++++++++++- docs/community.aws.lambda_policy_module.rst | 3 +- docs/community.aws.lightsail_module.rst | 3 +- .../community.aws.rds_cluster_info_module.rst | 3 +- docs/community.aws.rds_cluster_module.rst | 3 +- ...community.aws.rds_instance_info_module.rst | 20 +- docs/community.aws.rds_instance_module.rst | 155 +++++- ...unity.aws.rds_instance_snapshot_module.rst | 94 +++- ...unity.aws.rds_option_group_info_module.rst | 3 +- .../community.aws.rds_option_group_module.rst | 6 +- docs/community.aws.rds_param_group_module.rst | 3 +- ...community.aws.rds_snapshot_info_module.rst | 3 +- .../community.aws.rds_subnet_group_module.rst | 3 +- ...redshift_cross_region_snapshots_module.rst | 3 +- docs/community.aws.redshift_info_module.rst | 3 +- docs/community.aws.redshift_module.rst | 3 +- ...unity.aws.redshift_subnet_group_module.rst | 3 +- ...munity.aws.route53_health_check_module.rst | 5 +- docs/community.aws.route53_info_module.rst | 3 +- docs/community.aws.route53_module.rst | 175 +++++-- docs/community.aws.route53_zone_module.rst | 3 +- ...nity.aws.s3_bucket_notification_module.rst | 3 +- docs/community.aws.s3_lifecycle_module.rst | 3 +- docs/community.aws.s3_logging_module.rst | 3 +- ...ty.aws.s3_metrics_configuration_module.rst | 3 +- docs/community.aws.s3_sync_module.rst | 7 +- docs/community.aws.s3_website_module.rst | 3 +- docs/community.aws.sns_module.rst | 3 +- docs/community.aws.sns_topic_info_module.rst | 3 +- docs/community.aws.sns_topic_module.rst | 3 +- docs/community.aws.sqs_queue_module.rst | 3 +- docs/community.aws.sts_assume_role_module.rst | 3 +- ...community.aws.sts_session_token_module.rst | 3 +- ...community.aws.wafv2_ip_set_info_module.rst | 3 +- docs/community.aws.wafv2_ip_set_module.rst | 3 +- ...munity.aws.wafv2_resources_info_module.rst | 3 +- docs/community.aws.wafv2_resources_module.rst | 3 +- ...unity.aws.wafv2_rule_group_info_module.rst | 3 +- .../community.aws.wafv2_rule_group_module.rst | 3 +- ...ommunity.aws.wafv2_web_acl_info_module.rst | 3 +- docs/community.aws.wafv2_web_acl_module.rst | 3 +- galaxy.yml | 4 +- 204 files changed, 2005 insertions(+), 306 deletions(-) delete mode 100644 changelogs/fragments/0000-ecs_taskdefinition_fix.yml delete mode 100644 changelogs/fragments/1002-rds_instance-stabilize-and-support-iam-roles.yml delete mode 100644 changelogs/fragments/1033-ec2_asg-check-mode-support.yml delete mode 100644 changelogs/fragments/1052-aws_kms-stabilize-integration-tests.yml delete mode 100644 changelogs/fragments/1059-iam_user-add-new-ret-val-handle-errors.yml delete mode 100644 changelogs/fragments/1077-s3_lifecycle-transition-days-zero.yml delete mode 100644 changelogs/fragments/1078-rds_instance_snapshot-add-copy-snapshot.yml delete mode 100644 changelogs/fragments/1085-s3_lifecycle-check-that-configuration-is-complete-before-returning.yml delete mode 100644 changelogs/fragments/1093-iam_policy-update-docs-and-add-required_if.yml delete mode 100644 changelogs/fragments/1105-rds_instance-add-deletion_protection-parameter.yml delete mode 100644 changelogs/fragments/1108-lambda-checkmode-fix-kms_key_arn-param.yml delete mode 100644 changelogs/fragments/1115-execute_lambda-checkmode-fix-update-return-docs.yml delete mode 100644 changelogs/fragments/1117-route53-add_geo_location_support.yml delete mode 100644 changelogs/fragments/1300-ecs_service-placementConstraints.yml delete mode 100644 changelogs/fragments/789-rds_instance_snapshot.yml delete mode 100644 changelogs/fragments/967-dynamodb_table.yml create mode 100644 docs/community.aws.aws_api_gateway_domain_module.rst diff --git a/CHANGELOG.rst b/CHANGELOG.rst index 25804eca865..708ace81021 100644 --- a/CHANGELOG.rst +++ b/CHANGELOG.rst @@ -5,6 +5,55 @@ community.aws Release Notes .. contents:: Topics +v3.3.0 +====== + +Release Summary +--------------- + +This is the minor release of the ``community.aws`` collection. + +Minor Changes +------------- + +- aws_kms - add extra key/value pair to return data (key_policies) to return each policy as a dictionary rather than json string (https://github.com/ansible-collections/community.aws/pull/1052). +- aws_kms - fix some bugs in integration tests and add check mode support for key rotation as well as document issues with time taken for requested changes to be reflected on AWS (https://github.com/ansible-collections/community.aws/pull/1052). +- ec2_asg - add check mode support (https://github.com/ansible-collections/community.aws/pull/1033). +- iam_policy - update broken examples and add RETURN section to documentation; add extra integration tests for idempotency check mode runs (https://github.com/ansible-collections/community.aws/pull/1093). +- iam_user - add `user` value to return data structure to deprecate old `iam_user` (https://github.com/ansible-collections/community.aws/pull/1059). +- lambda - add kms_key_arn parameter (https://github.com/ansible-collections/community.aws/pull/1108). +- rds_instance - add `deletion_protection` parameter (https://github.com/ansible-collections/community.aws/pull/1105). +- rds_instance - add support for addition/removal of iam roles to db instance (https://github.com/ansible-collections/community.aws/pull/1002). +- rds_instance_snapshot - add ``check_mode`` (https://github.com/ansible-collections/community.aws/pull/789). +- rds_instance_snapshot - add copy_db_snapshot functionality (https://github.com/ansible-collections/community.aws/pull/1078). +- rds_instance_snapshot - add integration tests (https://github.com/ansible-collections/community.aws/pull/789). +- rds_instance_snapshot - update module to use handlers defined in module_utils/rds.py (https://github.com/ansible-collections/community.aws/pull/789). +- route53 - add support for GeoLocation param (https://github.com/ansible-collections/amazon.aws/pull/1117). + +Bugfixes +-------- + +- dynamodb_table - fix an issue when creating secondary indexes with global_keys_only (https://github.com/ansible-collections/community.aws/issues/967). +- ecs_service - add missing change detect of ``health_check_grace_period_seconds`` parameter (https://github.com/ansible-collections/community.aws/pull/1145). +- ecs_service - fix broken compare of ``task_definition`` that results always in a changed task (https://github.com/ansible-collections/community.aws/pull/1145). +- ecs_service - fix validation for ``placement_constraints``. It's possible to use ``distinctInstance`` placement constraint now (https://github.com/ansible-collections/community.aws/issues/1058) +- ecs_taskdefinition - fix broken change detect of ``launch_type`` parameter (https://github.com/ansible-collections/community.aws/pull/1145). +- execute_lambda - add waiter for function_updated (https://github.com/ansible-collections/community.aws/pull/1108). +- execute_lambda - fix check mode and update RETURN documentation (https://github.com/ansible-collections/community.aws/pull/1115). +- iam_policy - require one of `policy_document` and `policy_json` when state is present to prevent MalformedPolicyDocumentException from being thrown (https://github.com/ansible-collections/community.aws/pull/1093). +- iam_user - don't delete user login profile on check mode (https://github.com/ansible-collections/community.aws/pull/1059). +- iam_user_info - gracefully handle when no users are found (https://github.com/ansible-collections/community.aws/pull/1059). +- lambda - fix check mode on creation (https://github.com/ansible-collections/community.aws/pull/1108). +- rds_instance - fix check_mode and idempotency issues and added integration tests for all tests in suite (https://github.com/ansible-collections/community.aws/pull/1002). +- rds_instance_snapshot - don't require `db_instance_identifier` on state = present (https://github.com/ansible-collections/community.aws/pull/1078). +- s3_lifecycle - add support of value *0* for ``transition_days`` (https://github.com/ansible-collections/community.aws/pull/1077). +- s3_lifecycle - check that configuration is complete before returning (https://github.com/ansible-collections/community.aws/pull/1085). + +New Modules +----------- + +- aws_api_gateway_domain - Manage AWS API Gateway custom domains + v3.2.1 ====== diff --git a/README.md b/README.md index a7da9cde983..59b57b6e1ed 100644 --- a/README.md +++ b/README.md @@ -9,8 +9,8 @@ AWS related modules and plugins supported by the Ansible Cloud team are in the [ This collection has been tested against following Ansible versions: **>=2.9.10**. -For collections that support Ansible 2.9, please ensure you update your `network_os` to use the -fully qualified collection name (for example, `cisco.ios.ios`). +For collections that support Ansible 2.9, please ensure you update your `network_os` to use the +fully qualified collection name (for example, `cisco.ios.ios`). Plugins and modules within a collection may be tested with only specific Ansible versions. A collection may contain metadata that identifies these versions. PEP440 is the schema used to describe the versions of Ansible. @@ -37,6 +37,7 @@ Name | Description [community.aws.aws_acm](https://github.com/ansible-collections/community.aws/blob/stable-3/docs/community.aws.aws_acm_module.rst)|Upload and delete certificates in the AWS Certificate Manager service [community.aws.aws_acm_info](https://github.com/ansible-collections/community.aws/blob/stable-3/docs/community.aws.aws_acm_info_module.rst)|Retrieve certificate information from AWS Certificate Manager service [community.aws.aws_api_gateway](https://github.com/ansible-collections/community.aws/blob/stable-3/docs/community.aws.aws_api_gateway_module.rst)|Manage AWS API Gateway APIs +[community.aws.aws_api_gateway_domain](https://github.com/ansible-collections/community.aws/blob/stable-3/docs/community.aws.aws_api_gateway_domain_module.rst)|Manage AWS API Gateway custom domains [community.aws.aws_application_scaling_policy](https://github.com/ansible-collections/community.aws/blob/stable-3/docs/community.aws.aws_application_scaling_policy_module.rst)|Manage Application Auto Scaling Scaling Policies [community.aws.aws_batch_compute_environment](https://github.com/ansible-collections/community.aws/blob/stable-3/docs/community.aws.aws_batch_compute_environment_module.rst)|Manage AWS Batch Compute Environments [community.aws.aws_batch_job_definition](https://github.com/ansible-collections/community.aws/blob/stable-3/docs/community.aws.aws_batch_job_definition_module.rst)|Manage AWS Batch Job Definitions @@ -182,7 +183,7 @@ Name | Description [community.aws.rds_cluster_info](https://github.com/ansible-collections/community.aws/blob/stable-3/docs/community.aws.rds_cluster_info_module.rst)|Obtain information about one or more RDS clusters [community.aws.rds_instance](https://github.com/ansible-collections/community.aws/blob/stable-3/docs/community.aws.rds_instance_module.rst)|Manage RDS instances [community.aws.rds_instance_info](https://github.com/ansible-collections/community.aws/blob/stable-3/docs/community.aws.rds_instance_info_module.rst)|obtain information about one or more RDS instances -[community.aws.rds_instance_snapshot](https://github.com/ansible-collections/community.aws/blob/stable-3/docs/community.aws.rds_instance_snapshot_module.rst)|manage Amazon RDS snapshots. +[community.aws.rds_instance_snapshot](https://github.com/ansible-collections/community.aws/blob/stable-3/docs/community.aws.rds_instance_snapshot_module.rst)|Manage Amazon RDS instance snapshots [community.aws.rds_option_group](https://github.com/ansible-collections/community.aws/blob/stable-3/docs/community.aws.rds_option_group_module.rst)|rds_option_group module [community.aws.rds_option_group_info](https://github.com/ansible-collections/community.aws/blob/stable-3/docs/community.aws.rds_option_group_info_module.rst)|rds_option_group_info module [community.aws.rds_param_group](https://github.com/ansible-collections/community.aws/blob/stable-3/docs/community.aws.rds_param_group_module.rst)|manage RDS parameter groups diff --git a/changelogs/changelog.yaml b/changelogs/changelog.yaml index 9107aa45c73..135d13b09e5 100644 --- a/changelogs/changelog.yaml +++ b/changelogs/changelog.yaml @@ -1887,3 +1887,73 @@ releases: - 1064-ec2_asg_change_purge_tags.yml - 3.2.1.yml release_date: '2022-04-14' + 3.3.0: + changes: + bugfixes: + - dynamodb_table - fix an issue when creating secondary indexes with global_keys_only + (https://github.com/ansible-collections/community.aws/issues/967). + - ecs_service - add missing change detect of ``health_check_grace_period_seconds`` + parameter (https://github.com/ansible-collections/community.aws/pull/1145). + - ecs_service - fix broken compare of ``task_definition`` that results always + in a changed task (https://github.com/ansible-collections/community.aws/pull/1145). + - ecs_service - fix validation for ``placement_constraints``. It's possible + to use ``distinctInstance`` placement constraint now (https://github.com/ansible-collections/community.aws/issues/1058) + - ecs_taskdefinition - fix broken change detect of ``launch_type`` parameter + (https://github.com/ansible-collections/community.aws/pull/1145). + - execute_lambda - add waiter for function_updated (https://github.com/ansible-collections/community.aws/pull/1108). + - execute_lambda - fix check mode and update RETURN documentation (https://github.com/ansible-collections/community.aws/pull/1115). + - iam_policy - require one of `policy_document` and `policy_json` when state + is present to prevent MalformedPolicyDocumentException from being thrown (https://github.com/ansible-collections/community.aws/pull/1093). + - iam_user - don't delete user login profile on check mode (https://github.com/ansible-collections/community.aws/pull/1059). + - iam_user_info - gracefully handle when no users are found (https://github.com/ansible-collections/community.aws/pull/1059). + - lambda - fix check mode on creation (https://github.com/ansible-collections/community.aws/pull/1108). + - rds_instance - fix check_mode and idempotency issues and added integration + tests for all tests in suite (https://github.com/ansible-collections/community.aws/pull/1002). + - rds_instance_snapshot - don't require `db_instance_identifier` on state = present (https://github.com/ansible-collections/community.aws/pull/1078). + - s3_lifecycle - add support of value *0* for ``transition_days`` (https://github.com/ansible-collections/community.aws/pull/1077). + - s3_lifecycle - check that configuration is complete before returning (https://github.com/ansible-collections/community.aws/pull/1085). + minor_changes: + - aws_kms - add extra key/value pair to return data (key_policies) to return + each policy as a dictionary rather than json string (https://github.com/ansible-collections/community.aws/pull/1052). + - aws_kms - fix some bugs in integration tests and add check mode support for + key rotation as well as document issues with time taken for requested changes + to be reflected on AWS (https://github.com/ansible-collections/community.aws/pull/1052). + - ec2_asg - add check mode support (https://github.com/ansible-collections/community.aws/pull/1033). + - iam_policy - update broken examples and add RETURN section to documentation; + add extra integration tests for idempotency check mode runs (https://github.com/ansible-collections/community.aws/pull/1093). + - iam_user - add `user` value to return data structure to deprecate old `iam_user` + (https://github.com/ansible-collections/community.aws/pull/1059). + - lambda - add kms_key_arn parameter (https://github.com/ansible-collections/community.aws/pull/1108). + - rds_instance - add `deletion_protection` parameter (https://github.com/ansible-collections/community.aws/pull/1105). + - rds_instance - add support for addition/removal of iam roles to db instance + (https://github.com/ansible-collections/community.aws/pull/1002). + - rds_instance_snapshot - add ``check_mode`` (https://github.com/ansible-collections/community.aws/pull/789). + - rds_instance_snapshot - add copy_db_snapshot functionality (https://github.com/ansible-collections/community.aws/pull/1078). + - rds_instance_snapshot - add integration tests (https://github.com/ansible-collections/community.aws/pull/789). + - rds_instance_snapshot - update module to use handlers defined in module_utils/rds.py + (https://github.com/ansible-collections/community.aws/pull/789). + - route53 - add support for GeoLocation param (https://github.com/ansible-collections/amazon.aws/pull/1117). + release_summary: This is the minor release of the ``community.aws`` collection. + fragments: + - 0000-ecs_taskdefinition_fix.yml + - 1002-rds_instance-stabilize-and-support-iam-roles.yml + - 1033-ec2_asg-check-mode-support.yml + - 1052-aws_kms-stabilize-integration-tests.yml + - 1059-iam_user-add-new-ret-val-handle-errors.yml + - 1077-s3_lifecycle-transition-days-zero.yml + - 1078-rds_instance_snapshot-add-copy-snapshot.yml + - 1085-s3_lifecycle-check-that-configuration-is-complete-before-returning.yml + - 1093-iam_policy-update-docs-and-add-required_if.yml + - 1105-rds_instance-add-deletion_protection-parameter.yml + - 1108-lambda-checkmode-fix-kms_key_arn-param.yml + - 1115-execute_lambda-checkmode-fix-update-return-docs.yml + - 1117-route53-add_geo_location_support.yml + - 1300-ecs_service-placementConstraints.yml + - 3.3.0.yml + - 789-rds_instance_snapshot.yml + - 967-dynamodb_table.yml + modules: + - description: Manage AWS API Gateway custom domains + name: aws_api_gateway_domain + namespace: '' + release_date: '2022-05-30' diff --git a/changelogs/fragments/0000-ecs_taskdefinition_fix.yml b/changelogs/fragments/0000-ecs_taskdefinition_fix.yml deleted file mode 100644 index 0f11ebd2f0b..00000000000 --- a/changelogs/fragments/0000-ecs_taskdefinition_fix.yml +++ /dev/null @@ -1,4 +0,0 @@ -bugfixes: - - ecs_taskdefinition - fix broken change detect of ``launch_type`` parameter (https://github.com/ansible-collections/community.aws/pull/1145). - - ecs_service - fix broken compare of ``task_definition`` that results always in a changed task (https://github.com/ansible-collections/community.aws/pull/1145). - - ecs_service - add missing change detect of ``health_check_grace_period_seconds`` parameter (https://github.com/ansible-collections/community.aws/pull/1145). \ No newline at end of file diff --git a/changelogs/fragments/1002-rds_instance-stabilize-and-support-iam-roles.yml b/changelogs/fragments/1002-rds_instance-stabilize-and-support-iam-roles.yml deleted file mode 100644 index 141cc05b1a8..00000000000 --- a/changelogs/fragments/1002-rds_instance-stabilize-and-support-iam-roles.yml +++ /dev/null @@ -1,4 +0,0 @@ -minor_changes: - - rds_instance - add support for addition/removal of iam roles to db instance (https://github.com/ansible-collections/community.aws/pull/1002). -bugfixes: - - rds_instance - fix check_mode and idempotency issues and added integration tests for all tests in suite (https://github.com/ansible-collections/community.aws/pull/1002). diff --git a/changelogs/fragments/1033-ec2_asg-check-mode-support.yml b/changelogs/fragments/1033-ec2_asg-check-mode-support.yml deleted file mode 100644 index 8f198bd9b8e..00000000000 --- a/changelogs/fragments/1033-ec2_asg-check-mode-support.yml +++ /dev/null @@ -1,2 +0,0 @@ -minor_changes: -- ec2_asg - add check mode support (https://github.com/ansible-collections/community.aws/pull/1033). diff --git a/changelogs/fragments/1052-aws_kms-stabilize-integration-tests.yml b/changelogs/fragments/1052-aws_kms-stabilize-integration-tests.yml deleted file mode 100644 index 7a084d405d1..00000000000 --- a/changelogs/fragments/1052-aws_kms-stabilize-integration-tests.yml +++ /dev/null @@ -1,3 +0,0 @@ -minor_changes: - - aws_kms - fix some bugs in integration tests and add check mode support for key rotation as well as document issues with time taken for requested changes to be reflected on AWS (https://github.com/ansible-collections/community.aws/pull/1052). - - aws_kms - add extra key/value pair to return data (key_policies) to return each policy as a dictionary rather than json string (https://github.com/ansible-collections/community.aws/pull/1052). diff --git a/changelogs/fragments/1059-iam_user-add-new-ret-val-handle-errors.yml b/changelogs/fragments/1059-iam_user-add-new-ret-val-handle-errors.yml deleted file mode 100644 index 77cc115f7aa..00000000000 --- a/changelogs/fragments/1059-iam_user-add-new-ret-val-handle-errors.yml +++ /dev/null @@ -1,5 +0,0 @@ -minor_changes: -- iam_user - add `user` value to return data structure to deprecate old `iam_user` (https://github.com/ansible-collections/community.aws/pull/1059). -bugfixes: -- iam_user - don't delete user login profile on check mode (https://github.com/ansible-collections/community.aws/pull/1059). -- iam_user_info - gracefully handle when no users are found (https://github.com/ansible-collections/community.aws/pull/1059). diff --git a/changelogs/fragments/1077-s3_lifecycle-transition-days-zero.yml b/changelogs/fragments/1077-s3_lifecycle-transition-days-zero.yml deleted file mode 100644 index cdef5072d6b..00000000000 --- a/changelogs/fragments/1077-s3_lifecycle-transition-days-zero.yml +++ /dev/null @@ -1,2 +0,0 @@ -bugfixes: - - s3_lifecycle - add support of value *0* for ``transition_days`` (https://github.com/ansible-collections/community.aws/pull/1077). diff --git a/changelogs/fragments/1078-rds_instance_snapshot-add-copy-snapshot.yml b/changelogs/fragments/1078-rds_instance_snapshot-add-copy-snapshot.yml deleted file mode 100644 index dae38806313..00000000000 --- a/changelogs/fragments/1078-rds_instance_snapshot-add-copy-snapshot.yml +++ /dev/null @@ -1,5 +0,0 @@ -minor_changes: - - rds_instance_snapshot - add copy_db_snapshot functionality (https://github.com/ansible-collections/community.aws/pull/1078). - -bugfixes: - - don't require `db_instance_identifier` on state = present (https://github.com/ansible-collections/community.aws/pull/1078). diff --git a/changelogs/fragments/1085-s3_lifecycle-check-that-configuration-is-complete-before-returning.yml b/changelogs/fragments/1085-s3_lifecycle-check-that-configuration-is-complete-before-returning.yml deleted file mode 100644 index b8d464cae78..00000000000 --- a/changelogs/fragments/1085-s3_lifecycle-check-that-configuration-is-complete-before-returning.yml +++ /dev/null @@ -1,2 +0,0 @@ -bugfixes: - - s3_lifecycle - check that configuration is complete before returning (https://github.com/ansible-collections/community.aws/pull/1085). diff --git a/changelogs/fragments/1093-iam_policy-update-docs-and-add-required_if.yml b/changelogs/fragments/1093-iam_policy-update-docs-and-add-required_if.yml deleted file mode 100644 index 0bac9667140..00000000000 --- a/changelogs/fragments/1093-iam_policy-update-docs-and-add-required_if.yml +++ /dev/null @@ -1,4 +0,0 @@ -minor_changes: - - iam_policy - update broken examples and add RETURN section to documentation; add extra integration tests for idempotency check mode runs (https://github.com/ansible-collections/community.aws/pull/1093). -bugfixes: - - iam_policy - require one of `policy_document` and `policy_json` when state is present to prevent MalformedPolicyDocumentException from being thrown (https://github.com/ansible-collections/community.aws/pull/1093). diff --git a/changelogs/fragments/1105-rds_instance-add-deletion_protection-parameter.yml b/changelogs/fragments/1105-rds_instance-add-deletion_protection-parameter.yml deleted file mode 100644 index eca574e3929..00000000000 --- a/changelogs/fragments/1105-rds_instance-add-deletion_protection-parameter.yml +++ /dev/null @@ -1,2 +0,0 @@ -minor_changes: - - rds_instance - add `deletion_protection` parameter (https://github.com/ansible-collections/community.aws/pull/1105). diff --git a/changelogs/fragments/1108-lambda-checkmode-fix-kms_key_arn-param.yml b/changelogs/fragments/1108-lambda-checkmode-fix-kms_key_arn-param.yml deleted file mode 100644 index 29a46721b45..00000000000 --- a/changelogs/fragments/1108-lambda-checkmode-fix-kms_key_arn-param.yml +++ /dev/null @@ -1,5 +0,0 @@ -minor_changes: - - lambda - add kms_key_arn parameter (https://github.com/ansible-collections/community.aws/pull/1108). -bugfixes: - - lambda - fix check mode on creation (https://github.com/ansible-collections/community.aws/pull/1108). - - execute_lamba - add waiter for function_updated (https://github.com/ansible-collections/community.aws/pull/1108). diff --git a/changelogs/fragments/1115-execute_lambda-checkmode-fix-update-return-docs.yml b/changelogs/fragments/1115-execute_lambda-checkmode-fix-update-return-docs.yml deleted file mode 100644 index fd4ba6c5a8d..00000000000 --- a/changelogs/fragments/1115-execute_lambda-checkmode-fix-update-return-docs.yml +++ /dev/null @@ -1,2 +0,0 @@ -bugfixes: - - execute_lambda - fix check mode and update RETURN documentation (https://github.com/ansible-collections/community.aws/pull/1115). diff --git a/changelogs/fragments/1117-route53-add_geo_location_support.yml b/changelogs/fragments/1117-route53-add_geo_location_support.yml deleted file mode 100644 index 8dfa4399f7d..00000000000 --- a/changelogs/fragments/1117-route53-add_geo_location_support.yml +++ /dev/null @@ -1,2 +0,0 @@ -minor_changes: - - route53 - add support for GeoLocation param (https://github.com/ansible-collections/amazon.aws/pull/1117). diff --git a/changelogs/fragments/1300-ecs_service-placementConstraints.yml b/changelogs/fragments/1300-ecs_service-placementConstraints.yml deleted file mode 100644 index 85e3d36de4d..00000000000 --- a/changelogs/fragments/1300-ecs_service-placementConstraints.yml +++ /dev/null @@ -1,2 +0,0 @@ -bugfixes: - - ecs_service - fix validation for ``placement_constraints``. It's possible to use ``distinctInstance`` placement constraint now (https://github.com/ansible-collections/community.aws/issues/1058) diff --git a/changelogs/fragments/789-rds_instance_snapshot.yml b/changelogs/fragments/789-rds_instance_snapshot.yml deleted file mode 100644 index dd4d0096c06..00000000000 --- a/changelogs/fragments/789-rds_instance_snapshot.yml +++ /dev/null @@ -1,4 +0,0 @@ -minor_changes: -- rds_instance_snapshot - update module to use handlers defined in module_utils/rds.py (https://github.com/ansible-collections/community.aws/pull/789). -- rds_instance_snapshot - add ``check_mode`` (https://github.com/ansible-collections/community.aws/pull/789). -- rds_instance_snapshot - add integration tests (https://github.com/ansible-collections/community.aws/pull/789). diff --git a/changelogs/fragments/967-dynamodb_table.yml b/changelogs/fragments/967-dynamodb_table.yml deleted file mode 100644 index f404094b583..00000000000 --- a/changelogs/fragments/967-dynamodb_table.yml +++ /dev/null @@ -1,2 +0,0 @@ -bugfixes: -- dynamodb_table - fix an issue when creating secondary indexes with global_keys_only (https://github.com/ansible-collections/community.aws/issues/967). diff --git a/docs/community.aws.aws_acm_info_module.rst b/docs/community.aws.aws_acm_info_module.rst index b7c06305302..c8b6a977e9a 100644 --- a/docs/community.aws.aws_acm_info_module.rst +++ b/docs/community.aws.aws_acm_info_module.rst @@ -229,7 +229,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_acm_module.rst b/docs/community.aws.aws_acm_module.rst index 57e2c254547..d0184e224e2 100644 --- a/docs/community.aws.aws_acm_module.rst +++ b/docs/community.aws.aws_acm_module.rst @@ -344,7 +344,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
@@ -434,7 +435,7 @@ Examples - name: create/update a certificate with a chain community.aws.aws_acm: certificate: "{{ lookup('file', 'cert.pem' ) }}" - privateKey: "{{ lookup('file', 'key.pem' ) }}" + private_key: "{{ lookup('file', 'key.pem' ) }}" name_tag: my_cert certificate_chain: "{{ lookup('file', 'chain.pem' ) }}" state: present diff --git a/docs/community.aws.aws_api_gateway_domain_module.rst b/docs/community.aws.aws_api_gateway_domain_module.rst new file mode 100644 index 00000000000..9db749f7506 --- /dev/null +++ b/docs/community.aws.aws_api_gateway_domain_module.rst @@ -0,0 +1,416 @@ +.. _community.aws.aws_api_gateway_domain_module: + + +************************************ +community.aws.aws_api_gateway_domain +************************************ + +**Manage AWS API Gateway custom domains** + + +Version added: 3.3.0 + +.. contents:: + :local: + :depth: 1 + + +Synopsis +-------- +- Manages API Gateway custom domains for API GW Rest APIs. +- AWS API Gateway custom domain setups use CloudFront behind the scenes. So you will get a CloudFront distribution as a result, configured to be aliased with your domain. + + + +Requirements +------------ +The below requirements are needed on the host that executes this module. + +- python >= 3.6 +- boto3 >= 1.16.0 +- botocore >= 1.19.0 + + +Parameters +---------- + +.. raw:: html + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ParameterChoices/DefaultsComments
+
+ aws_access_key + +
+ string +
+
+ +
AWS access key. If not set then the value of the AWS_ACCESS_KEY_ID, AWS_ACCESS_KEY or EC2_ACCESS_KEY environment variable is used.
+
If profile is set this parameter is ignored.
+
Passing the aws_access_key and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
+

aliases: ec2_access_key, access_key
+
+
+ aws_ca_bundle + +
+ path +
+
+ +
The location of a CA Bundle to use when validating SSL certificates.
+
Not used by boto 2 based modules.
+
Note: The CA Bundle is read 'module' side and may need to be explicitly copied from the controller if not run locally.
+
+
+ aws_config + +
+ dictionary +
+
+ +
A dictionary to modify the botocore configuration.
+ +
Only the 'user_agent' key is used for boto modules. See http://boto.cloudhackers.com/en/latest/boto_config_tut.html#boto for more boto configuration.
+
+
+ aws_secret_key + +
+ string +
+
+ +
AWS secret key. If not set then the value of the AWS_SECRET_ACCESS_KEY, AWS_SECRET_KEY, or EC2_SECRET_KEY environment variable is used.
+
If profile is set this parameter is ignored.
+
Passing the aws_secret_key and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
+

aliases: ec2_secret_key, secret_key
+
+
+ certificate_arn + +
+ string + / required +
+
+ +
AWS Certificate Manger (ACM) TLS certificate ARN.
+
+
+ debug_botocore_endpoint_logs + +
+ boolean +
+
+
    Choices: +
  • no ←
  • +
  • yes
  • +
+
+
Use a botocore.endpoint logger to parse the unique (rather than total) "resource:action" API calls made during a task, outputing the set to the resource_actions key in the task results. Use the aws_resource_action callback to output to total list made during a playbook. The ANSIBLE_DEBUG_BOTOCORE_LOGS environment variable may also be used.
+
+
+ domain_mappings + +
+ list + / elements=dictionary + / required +
+
+ +
Map your domain base paths to your API GW REST APIs, that you previously created. Use provided ID of the API setup and the release stage.
+
domain_mappings should be a list of dictionaries containing three keys: base_path, rest_api_id and stage.
+
Example: [{ base_path: v1, rest_api_id: abc123, stage: production }]
+
if you want base path to be just / omit the param completely or set it to empty string.
+
+
+ domain_name + +
+ string + / required +
+
+ +
Domain name you want to use for your API GW deployment.
+
+
+ ec2_url + +
+ string +
+
+ +
URL to use to connect to EC2 or your Eucalyptus cloud (by default the module will use EC2 endpoints). Ignored for modules where region is required. Must be specified for all other modules if region is not used. If not set then the value of the EC2_URL environment variable, if any, is used.
+

aliases: aws_endpoint_url, endpoint_url
+
+
+ endpoint_type + +
+ string +
+
+
    Choices: +
  • EDGE ←
  • +
  • REGIONAL
  • +
  • PRIVATE
  • +
+
+
API endpoint configuration for domain. Use EDGE for edge-optimized endpoint, or use REGIONAL or PRIVATE.
+
+
+ profile + +
+ string +
+
+ +
Using profile will override aws_access_key, aws_secret_key and security_token and support for passing them at the same time as profile has been deprecated.
+
aws_access_key, aws_secret_key and security_token will be made mutually exclusive with profile after 2022-06-01.
+

aliases: aws_profile
+
+
+ region + +
+ string +
+
+ +
The AWS region to use. If not specified then the value of the AWS_REGION or EC2_REGION environment variable, if any, is used. See http://docs.aws.amazon.com/general/latest/gr/rande.html#ec2_region
+

aliases: aws_region, ec2_region
+
+
+ security_policy + +
+ string +
+
+
    Choices: +
  • TLS_1_0
  • +
  • TLS_1_2 ←
  • +
+
+
Set allowed TLS versions through AWS defined policies. Currently only TLS_1_0 and TLS_1_2 are available.
+
+
+ security_token + +
+ string +
+
+ +
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
+
If profile is set this parameter is ignored.
+
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
+
+
+ state + +
+ string +
+
+
    Choices: +
  • present ←
  • +
  • absent
  • +
+
+
Create or delete custom domain setup.
+
+
+ validate_certs + +
+ boolean +
+
+
    Choices: +
  • no
  • +
  • yes ←
  • +
+
+
When set to "no", SSL certificates will not be validated for communication with the AWS APIs.
+
+
+ + +Notes +----- + +.. note:: + - Does not create a DNS entry on Route53, for that use the route53 module. + - Only supports TLS certificates from AWS ACM that can just be referenced by the ARN, while the AWS API still offers (deprecated) options to add own Certificates. + - If parameters are not set within the module, the following environment variables can be used in decreasing order of precedence ``AWS_URL`` or ``EC2_URL``, ``AWS_PROFILE`` or ``AWS_DEFAULT_PROFILE``, ``AWS_ACCESS_KEY_ID`` or ``AWS_ACCESS_KEY`` or ``EC2_ACCESS_KEY``, ``AWS_SECRET_ACCESS_KEY`` or ``AWS_SECRET_KEY`` or ``EC2_SECRET_KEY``, ``AWS_SECURITY_TOKEN`` or ``EC2_SECURITY_TOKEN``, ``AWS_REGION`` or ``EC2_REGION``, ``AWS_CA_BUNDLE`` + - When no credentials are explicitly provided the AWS SDK (boto3) that Ansible uses will fall back to its configuration files (typically ``~/.aws/credentials``). See https://boto3.amazonaws.com/v1/documentation/api/latest/guide/credentials.html for more information. + - Modules based on the original AWS SDK (boto) may read their default configuration from different files. See https://boto.readthedocs.io/en/latest/boto_config_tut.html for more information. + - ``AWS_REGION`` or ``EC2_REGION`` can be typically be used to specify the AWS region, when required, but this can also be defined in the configuration files. + + + +Examples +-------- + +.. code-block:: yaml + + - name: Setup endpoint for a custom domain for your API Gateway HTTP API + community.aws.aws_api_gateway_domain: + domain_name: myapi.foobar.com + certificate_arn: 'arn:aws:acm:us-east-1:1231123123:certificate/8bd89412-abc123-xxxxx' + security_policy: TLS_1_2 + endpoint_type: EDGE + domain_mappings: + - { rest_api_id: abc123, stage: production } + state: present + register: api_gw_domain_result + + - name: Create a DNS record for your custom domain on route 53 (using route53 module) + community.aws.route53: + record: myapi.foobar.com + value: "{{ api_gw_domain_result.response.domain.distribution_domain_name }}" + type: A + alias: true + zone: foobar.com + alias_hosted_zone_id: "{{ api_gw_domain_result.response.domain.distribution_hosted_zone_id }}" + command: create + + + +Return Values +------------- +Common return values are documented `here `_, the following are the fields unique to this module: + +.. raw:: html + + + + + + + + + + + + +
KeyReturnedDescription
+
+ response + +
+ dictionary +
+
success +
The data returned by create_domain_name (or update and delete) and create_base_path_mapping methods by boto3.
+
+
Sample:
+
{'domain': {'domain_name': 'mydomain.com', 'certificate_arn': 'arn:aws:acm:xxxxxx', 'distribution_domain_name': 'xxxx.cloudfront.net', 'distribution_hosted_zone_id': 'ABC123123', 'endpoint_configuration': {'types': ['EDGE']}, 'domain_name_status': 'AVAILABLE', 'security_policy': 'TLS_1_2', 'tags': {}}, 'path_mappings': [{'base_path': '(empty)', 'rest_api_id': 'abcd123', 'stage': 'production'}]}
+
+

+ + +Status +------ + + +Authors +~~~~~~~ + +- Stefan Horning (@stefanhorning) diff --git a/docs/community.aws.aws_api_gateway_module.rst b/docs/community.aws.aws_api_gateway_module.rst index ae3357e3079..abb666f1dc3 100644 --- a/docs/community.aws.aws_api_gateway_module.rst +++ b/docs/community.aws.aws_api_gateway_module.rst @@ -294,7 +294,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_application_scaling_policy_module.rst b/docs/community.aws.aws_application_scaling_policy_module.rst index b320ddb3fc2..8dc604384c2 100644 --- a/docs/community.aws.aws_application_scaling_policy_module.rst +++ b/docs/community.aws.aws_application_scaling_policy_module.rst @@ -322,7 +322,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_batch_compute_environment_module.rst b/docs/community.aws.aws_batch_compute_environment_module.rst index 75cd5c4f7c9..1e10029a8ec 100644 --- a/docs/community.aws.aws_batch_compute_environment_module.rst +++ b/docs/community.aws.aws_batch_compute_environment_module.rst @@ -396,7 +396,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_batch_job_definition_module.rst b/docs/community.aws.aws_batch_job_definition_module.rst index 9602a2b91d7..a192a53842a 100644 --- a/docs/community.aws.aws_batch_job_definition_module.rst +++ b/docs/community.aws.aws_batch_job_definition_module.rst @@ -241,7 +241,7 @@ Parameters -
The image used to start a container. This string is passed directly to the Docker daemon. Images in the Docker Hub registry are available by default. Other repositories are specified with `` repository-url /image <colon>tag ``. Up to 255 letters (uppercase and lowercase), numbers, hyphens, underscores, colons, periods, forward slashes, and number signs are allowed. This parameter maps to Image in the Create a container section of the Docker Remote API and the IMAGE parameter of docker run.
+
The image used to start a container. This string is passed directly to the Docker daemon. Images in the Docker Hub registry are available by default. Other repositories are specified with repository-url/image-name:tag. Up to 255 letters (uppercase and lowercase), numbers, hyphens, underscores, colons, periods, forward slashes, and number signs are allowed. This parameter maps to Image in the Create a container section of the Docker Remote API and the IMAGE parameter of docker run.
@@ -464,7 +464,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_batch_job_queue_module.rst b/docs/community.aws.aws_batch_job_queue_module.rst index c5f3dc29ef5..81c579368a6 100644 --- a/docs/community.aws.aws_batch_job_queue_module.rst +++ b/docs/community.aws.aws_batch_job_queue_module.rst @@ -297,7 +297,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_codebuild_module.rst b/docs/community.aws.aws_codebuild_module.rst index d626c6d9e9c..fc5baac090d 100644 --- a/docs/community.aws.aws_codebuild_module.rst +++ b/docs/community.aws.aws_codebuild_module.rst @@ -508,7 +508,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_codecommit_module.rst b/docs/community.aws.aws_codecommit_module.rst index ade1a9b5902..08b8e6aa0eb 100644 --- a/docs/community.aws.aws_codecommit_module.rst +++ b/docs/community.aws.aws_codecommit_module.rst @@ -227,7 +227,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_codepipeline_module.rst b/docs/community.aws.aws_codepipeline_module.rst index c0d3810a90f..42087094c05 100644 --- a/docs/community.aws.aws_codepipeline_module.rst +++ b/docs/community.aws.aws_codepipeline_module.rst @@ -275,7 +275,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_config_aggregation_authorization_module.rst b/docs/community.aws.aws_config_aggregation_authorization_module.rst index 7bcb3ebfd71..f5227662b11 100644 --- a/docs/community.aws.aws_config_aggregation_authorization_module.rst +++ b/docs/community.aws.aws_config_aggregation_authorization_module.rst @@ -226,7 +226,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_config_aggregator_module.rst b/docs/community.aws.aws_config_aggregator_module.rst index 2ddc02ae5f1..5e58f304c0f 100644 --- a/docs/community.aws.aws_config_aggregator_module.rst +++ b/docs/community.aws.aws_config_aggregator_module.rst @@ -352,7 +352,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_config_delivery_channel_module.rst b/docs/community.aws.aws_config_delivery_channel_module.rst index f2189857725..2b48a6816d6 100644 --- a/docs/community.aws.aws_config_delivery_channel_module.rst +++ b/docs/community.aws.aws_config_delivery_channel_module.rst @@ -263,7 +263,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_config_recorder_module.rst b/docs/community.aws.aws_config_recorder_module.rst index 4098c1968c4..bee2aacc091 100644 --- a/docs/community.aws.aws_config_recorder_module.rst +++ b/docs/community.aws.aws_config_recorder_module.rst @@ -297,7 +297,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_config_rule_module.rst b/docs/community.aws.aws_config_rule_module.rst index 05028701e06..b3a70e9c0cb 100644 --- a/docs/community.aws.aws_config_rule_module.rst +++ b/docs/community.aws.aws_config_rule_module.rst @@ -342,7 +342,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
@@ -376,9 +377,9 @@ Parameters
Provides the source and type of the event that causes AWS Config to evaluate your AWS resources.
This parameter expects a list of dictionaries. Each dictionary expects the following key/value pairs.
-
Key `EventSource` The source of the event, such as an AWS service, that triggers AWS Config to evaluate your AWS resources.
-
Key `MessageType` The type of notification that triggers AWS Config to run an evaluation for a rule.
-
Key `MaximumExecutionFrequency` The frequency at which you want AWS Config to run evaluations for a custom rule with a periodic trigger.
+
Key EventSource The source of the event, such as an AWS service, that triggers AWS Config to evaluate your AWS resources.
+
Key MessageType The type of notification that triggers AWS Config to run an evaluation for a rule.
+
Key MaximumExecutionFrequency The frequency at which you want AWS Config to run evaluations for a custom rule with a periodic trigger.
diff --git a/docs/community.aws.aws_direct_connect_confirm_connection_module.rst b/docs/community.aws.aws_direct_connect_confirm_connection_module.rst index c4b4b25e059..fdeffad96d6 100644 --- a/docs/community.aws.aws_direct_connect_confirm_connection_module.rst +++ b/docs/community.aws.aws_direct_connect_confirm_connection_module.rst @@ -227,7 +227,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_direct_connect_connection_module.rst b/docs/community.aws.aws_direct_connect_connection_module.rst index 07d4cc47565..5108f7877a7 100644 --- a/docs/community.aws.aws_direct_connect_connection_module.rst +++ b/docs/community.aws.aws_direct_connect_connection_module.rst @@ -299,7 +299,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_direct_connect_gateway_module.rst b/docs/community.aws.aws_direct_connect_gateway_module.rst index 9c574b674f3..a0113384e01 100644 --- a/docs/community.aws.aws_direct_connect_gateway_module.rst +++ b/docs/community.aws.aws_direct_connect_gateway_module.rst @@ -244,7 +244,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_direct_connect_link_aggregation_group_module.rst b/docs/community.aws.aws_direct_connect_link_aggregation_group_module.rst index a1d3e4db233..4326414929a 100644 --- a/docs/community.aws.aws_direct_connect_link_aggregation_group_module.rst +++ b/docs/community.aws.aws_direct_connect_link_aggregation_group_module.rst @@ -337,7 +337,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_direct_connect_virtual_interface_module.rst b/docs/community.aws.aws_direct_connect_virtual_interface_module.rst index 34c12f951c4..65700a6b8c7 100644 --- a/docs/community.aws.aws_direct_connect_virtual_interface_module.rst +++ b/docs/community.aws.aws_direct_connect_virtual_interface_module.rst @@ -353,7 +353,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_eks_cluster_module.rst b/docs/community.aws.aws_eks_cluster_module.rst index 31b070a06c4..f0461c87423 100644 --- a/docs/community.aws.aws_eks_cluster_module.rst +++ b/docs/community.aws.aws_eks_cluster_module.rst @@ -241,7 +241,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_elasticbeanstalk_app_module.rst b/docs/community.aws.aws_elasticbeanstalk_app_module.rst index 00631b26d4f..980b1c05c4c 100644 --- a/docs/community.aws.aws_elasticbeanstalk_app_module.rst +++ b/docs/community.aws.aws_elasticbeanstalk_app_module.rst @@ -225,7 +225,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_glue_connection_module.rst b/docs/community.aws.aws_glue_connection_module.rst index c92843da48b..c2d51efe861 100644 --- a/docs/community.aws.aws_glue_connection_module.rst +++ b/docs/community.aws.aws_glue_connection_module.rst @@ -329,7 +329,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_glue_job_module.rst b/docs/community.aws.aws_glue_job_module.rst index 1075a779cfd..d4b95a2d53a 100644 --- a/docs/community.aws.aws_glue_job_module.rst +++ b/docs/community.aws.aws_glue_job_module.rst @@ -419,7 +419,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_inspector_target_module.rst b/docs/community.aws.aws_inspector_target_module.rst index 5a49db73b3b..d2595f8c4d3 100644 --- a/docs/community.aws.aws_inspector_target_module.rst +++ b/docs/community.aws.aws_inspector_target_module.rst @@ -210,7 +210,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_kms_info_module.rst b/docs/community.aws.aws_kms_info_module.rst index 569dd242299..cce98b3a036 100644 --- a/docs/community.aws.aws_kms_info_module.rst +++ b/docs/community.aws.aws_kms_info_module.rst @@ -286,7 +286,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
@@ -700,6 +701,26 @@ Common return values are documented `here abcd1234-abcd-1234-5678-ef1234567890 + +   + +
+ key_policies + +
+ list + / elements=dictionary +
+
added in 3.3.0
+ + always + +
list of policy documents for the key. Empty when access is denied even if there are policies.
+
+
Sample:
+
{'Version': '2012-10-17', 'Id': 'auto-ebs-2', 'Statement': [{'Sid': 'Allow access through EBS for all principals in the account that are authorized to use EBS', 'Effect': 'Allow', 'Principal': {'AWS': '*'}, 'Action': ['kms:Encrypt', 'kms:Decrypt', 'kms:ReEncrypt*', 'kms:GenerateDataKey*', 'kms:CreateGrant', 'kms:DescribeKey'], 'Resource': '*', 'Condition': {'StringEquals': {'kms:CallerAccount': '111111111111', 'kms:ViaService': 'ec2.ap-southeast-2.amazonaws.com'}}}, {'Sid': 'Allow direct access to key metadata to the account', 'Effect': 'Allow', 'Principal': {'AWS': 'arn:aws:iam::111111111111:root'}, 'Action': ['kms:Describe*', 'kms:Get*', 'kms:List*', 'kms:RevokeGrant'], 'Resource': '*'}]}
+ +   @@ -762,11 +783,12 @@ Common return values are documented `here
list + / elements=string
always -
list of policy documents for the keys. Empty when access is denied even if there are policies.
+
list of policy documents for the key. Empty when access is denied even if there are policies.

Sample:
{'Version': '2012-10-17', 'Id': 'auto-ebs-2', 'Statement': [{'Sid': 'Allow access through EBS for all principals in the account that are authorized to use EBS', 'Effect': 'Allow', 'Principal': {'AWS': '*'}, 'Action': ['kms:Encrypt', 'kms:Decrypt', 'kms:ReEncrypt*', 'kms:GenerateDataKey*', 'kms:CreateGrant', 'kms:DescribeKey'], 'Resource': '*', 'Condition': {'StringEquals': {'kms:CallerAccount': '111111111111', 'kms:ViaService': 'ec2.ap-southeast-2.amazonaws.com'}}}, {'Sid': 'Allow direct access to key metadata to the account', 'Effect': 'Allow', 'Principal': {'AWS': 'arn:aws:iam::111111111111:root'}, 'Action': ['kms:Describe*', 'kms:Get*', 'kms:List*', 'kms:RevokeGrant'], 'Resource': '*'}]}
diff --git a/docs/community.aws.aws_kms_module.rst b/docs/community.aws.aws_kms_module.rst index 08c985c5d14..5c859bd50d5 100644 --- a/docs/community.aws.aws_kms_module.rst +++ b/docs/community.aws.aws_kms_module.rst @@ -605,7 +605,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
@@ -669,6 +670,7 @@ Notes ----- .. note:: + - There are known inconsistencies in the amount of time required for updates of KMS keys to be fully reflected on AWS. This can cause issues when running duplicate tasks in succession or using the aws_kms_info module to fetch key metadata shortly after modifying keys. For this reason, it is recommended to use the return data from this module (aws_kms) to fetch a key's metadata. - If parameters are not set within the module, the following environment variables can be used in decreasing order of precedence ``AWS_URL`` or ``EC2_URL``, ``AWS_PROFILE`` or ``AWS_DEFAULT_PROFILE``, ``AWS_ACCESS_KEY_ID`` or ``AWS_ACCESS_KEY`` or ``EC2_ACCESS_KEY``, ``AWS_SECRET_ACCESS_KEY`` or ``AWS_SECRET_KEY`` or ``EC2_SECRET_KEY``, ``AWS_SECURITY_TOKEN`` or ``EC2_SECURITY_TOKEN``, ``AWS_REGION`` or ``EC2_REGION``, ``AWS_CA_BUNDLE`` - When no credentials are explicitly provided the AWS SDK (boto3) that Ansible uses will fall back to its configuration files (typically ``~/.aws/credentials``). See https://boto3.amazonaws.com/v1/documentation/api/latest/guide/credentials.html for more information. - Modules based on the original AWS SDK (boto) may read their default configuration from different files. See https://boto.readthedocs.io/en/latest/boto_config_tut.html for more information. @@ -839,6 +841,21 @@ Common return values are documented `here My Key for Protecting important stuff + + +
+ enable_key_rotation + +
+ boolean +
+ + always + +
Whether the automatic annual key rotation is enabled. Returns None if key rotation status can't be determined.
+
+ +
@@ -1081,6 +1098,25 @@ Common return values are documented `here abcd1234-abcd-1234-5678-ef1234567890 + + +
+ key_policies + +
+ list + / elements=dictionary +
+
added in 3.3.0
+ + always + +
list of policy documents for the key. Empty when access is denied even if there are policies.
+
+
Sample:
+
{'Version': '2012-10-17', 'Id': 'auto-ebs-2', 'Statement': [{'Sid': 'Allow access through EBS for all principals in the account that are authorized to use EBS', 'Effect': 'Allow', 'Principal': {'AWS': '*'}, 'Action': ['kms:Encrypt', 'kms:Decrypt', 'kms:ReEncrypt*', 'kms:GenerateDataKey*', 'kms:CreateGrant', 'kms:DescribeKey'], 'Resource': '*', 'Condition': {'StringEquals': {'kms:CallerAccount': '111111111111', 'kms:ViaService': 'ec2.ap-southeast-2.amazonaws.com'}}}, {'Sid': 'Allow direct access to key metadata to the account', 'Effect': 'Allow', 'Principal': {'AWS': 'arn:aws:iam::111111111111:root'}, 'Action': ['kms:Describe*', 'kms:Get*', 'kms:List*', 'kms:RevokeGrant'], 'Resource': '*'}]}
+ +
@@ -1139,14 +1175,15 @@ Common return values are documented `here
list + / elements=string
always -
list of policy documents for the keys. Empty when access is denied even if there are policies.
+
list of policy documents for the key. Empty when access is denied even if there are policies.

Sample:
-
{'Version': '2012-10-17', 'Id': 'auto-ebs-2', 'Statement': [{'Sid': 'Allow access through EBS for all principals in the account that are authorized to use EBS', 'Effect': 'Allow', 'Principal': {'AWS': '*'}, 'Action': ['kms:Encrypt', 'kms:Decrypt', 'kms:ReEncrypt*', 'kms:GenerateDataKey*', 'kms:CreateGrant', 'kms:DescribeKey'], 'Resource': '*', 'Condition': {'StringEquals': {'kms:CallerAccount': '111111111111', 'kms:ViaService': 'ec2.ap-southeast-2.amazonaws.com'}}}, {'Sid': 'Allow direct access to key metadata to the account', 'Effect': 'Allow', 'Principal': {'AWS': 'arn:aws:iam::111111111111:root'}, 'Action': ['kms:Describe*', 'kms:Get*', 'kms:List*', 'kms:RevokeGrant'], 'Resource': '*'}]}
+
{'Version': '2012-10-17', 'Id': 'auto-ebs-2', 'Statement': [{'Sid': 'Allow access through EBS for all principals in the account that are authorized to use EBS', 'Effect': 'Allow', 'Principal': None, 'AWS': '*', 'Action': ['kms:Encrypt', 'kms:Decrypt', 'kms:ReEncrypt*', 'kms:GenerateDataKey*', 'kms:CreateGrant', 'kms:DescribeKey'], 'Resource': '*', 'Condition': {'StringEquals': {'kms:CallerAccount': '111111111111', 'kms:ViaService': 'ec2.ap-southeast-2.amazonaws.com'}}}, {'Sid': 'Allow direct access to key metadata to the account', 'Effect': 'Allow', 'Principal': None, 'AWS': 'arn:aws:iam::111111111111:root', 'Action': ['kms:Describe*', 'kms:Get*', 'kms:List*', 'kms:RevokeGrant'], 'Resource': '*'}]}
diff --git a/docs/community.aws.aws_msk_cluster_module.rst b/docs/community.aws.aws_msk_cluster_module.rst index b19886bad2f..805324d557f 100644 --- a/docs/community.aws.aws_msk_cluster_module.rst +++ b/docs/community.aws.aws_msk_cluster_module.rst @@ -755,7 +755,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_msk_config_module.rst b/docs/community.aws.aws_msk_config_module.rst index b586991876d..78f70acbb00 100644 --- a/docs/community.aws.aws_msk_config_module.rst +++ b/docs/community.aws.aws_msk_config_module.rst @@ -258,7 +258,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_region_info_module.rst b/docs/community.aws.aws_region_info_module.rst index 5a812bebfed..804be95268a 100644 --- a/docs/community.aws.aws_region_info_module.rst +++ b/docs/community.aws.aws_region_info_module.rst @@ -215,7 +215,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_s3_bucket_info_module.rst b/docs/community.aws.aws_s3_bucket_info_module.rst index 4949c5de2b0..36031a95d9d 100644 --- a/docs/community.aws.aws_s3_bucket_info_module.rst +++ b/docs/community.aws.aws_s3_bucket_info_module.rst @@ -567,7 +567,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_s3_cors_module.rst b/docs/community.aws.aws_s3_cors_module.rst index ad8f384788d..a66c412f01a 100644 --- a/docs/community.aws.aws_s3_cors_module.rst +++ b/docs/community.aws.aws_s3_cors_module.rst @@ -226,7 +226,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_secret_module.rst b/docs/community.aws.aws_secret_module.rst index 05278edd68e..8a334532af4 100644 --- a/docs/community.aws.aws_secret_module.rst +++ b/docs/community.aws.aws_secret_module.rst @@ -173,7 +173,7 @@ Parameters -
Specifies the ARN or alias of the AWS KMS customer master key (CMK) to be used to encrypt the `secret_string` or `secret_binary` values in the versions stored in this secret.
+
Specifies the ARN or alias of the AWS KMS customer master key (CMK) to be used to encrypt the secret values in the versions stored in this secret.
@@ -340,7 +340,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_ses_identity_module.rst b/docs/community.aws.aws_ses_identity_module.rst index 09401492c9d..b9161ee208a 100644 --- a/docs/community.aws.aws_ses_identity_module.rst +++ b/docs/community.aws.aws_ses_identity_module.rst @@ -399,7 +399,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_ses_identity_policy_module.rst b/docs/community.aws.aws_ses_identity_policy_module.rst index 06123e4471d..27e34830a95 100644 --- a/docs/community.aws.aws_ses_identity_policy_module.rst +++ b/docs/community.aws.aws_ses_identity_policy_module.rst @@ -243,7 +243,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_ses_rule_set_module.rst b/docs/community.aws.aws_ses_rule_set_module.rst index c2c748cd714..5f5375a66b6 100644 --- a/docs/community.aws.aws_ses_rule_set_module.rst +++ b/docs/community.aws.aws_ses_rule_set_module.rst @@ -251,7 +251,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_sgw_info_module.rst b/docs/community.aws.aws_sgw_info_module.rst index 372fcb7ea10..7e9c9e5e4fc 100644 --- a/docs/community.aws.aws_sgw_info_module.rst +++ b/docs/community.aws.aws_sgw_info_module.rst @@ -270,7 +270,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_ssm_connection.rst b/docs/community.aws.aws_ssm_connection.rst index 8f0298fa339..7b54a0d14ca 100644 --- a/docs/community.aws.aws_ssm_connection.rst +++ b/docs/community.aws.aws_ssm_connection.rst @@ -397,7 +397,7 @@ Authors - Pat Sharkey (@psharkey) - HanumanthaRao MVL (@hanumantharaomvl) -- Gaurav Ashtikar (@gau1991 ) +- Gaurav Ashtikar (@gau1991) .. hint:: diff --git a/docs/community.aws.aws_ssm_parameter_store_module.rst b/docs/community.aws.aws_ssm_parameter_store_module.rst index edd05041d43..e7a36ce2593 100644 --- a/docs/community.aws.aws_ssm_parameter_store_module.rst +++ b/docs/community.aws.aws_ssm_parameter_store_module.rst @@ -281,7 +281,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_step_functions_state_machine_execution_module.rst b/docs/community.aws.aws_step_functions_state_machine_execution_module.rst index 9aa144d175b..60a5d05457d 100644 --- a/docs/community.aws.aws_step_functions_state_machine_execution_module.rst +++ b/docs/community.aws.aws_step_functions_state_machine_execution_module.rst @@ -291,7 +291,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_step_functions_state_machine_module.rst b/docs/community.aws.aws_step_functions_state_machine_module.rst index f6e3d3f0326..a45257bdf63 100644 --- a/docs/community.aws.aws_step_functions_state_machine_module.rst +++ b/docs/community.aws.aws_step_functions_state_machine_module.rst @@ -262,7 +262,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_waf_condition_module.rst b/docs/community.aws.aws_waf_condition_module.rst index 94ca42cfed2..39a305fa055 100644 --- a/docs/community.aws.aws_waf_condition_module.rst +++ b/docs/community.aws.aws_waf_condition_module.rst @@ -492,7 +492,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_waf_info_module.rst b/docs/community.aws.aws_waf_info_module.rst index 1c4858541d4..18f104ed4d7 100644 --- a/docs/community.aws.aws_waf_info_module.rst +++ b/docs/community.aws.aws_waf_info_module.rst @@ -209,7 +209,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_waf_rule_module.rst b/docs/community.aws.aws_waf_rule_module.rst index 091f8877da2..e408c5692bc 100644 --- a/docs/community.aws.aws_waf_rule_module.rst +++ b/docs/community.aws.aws_waf_rule_module.rst @@ -293,7 +293,7 @@ Parameters -
Whether or not to remove conditions that are not passed when updating `conditions`.
+
Whether or not to remove conditions that are not passed when updating conditions.
@@ -327,7 +327,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.aws_waf_web_acl_module.rst b/docs/community.aws.aws_waf_web_acl_module.rst index 1c78ba72184..adf64db041f 100644 --- a/docs/community.aws.aws_waf_web_acl_module.rst +++ b/docs/community.aws.aws_waf_web_acl_module.rst @@ -356,7 +356,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.cloudformation_exports_info_module.rst b/docs/community.aws.cloudformation_exports_info_module.rst index 41a3e9f0efb..3e5d9ae0d7c 100644 --- a/docs/community.aws.cloudformation_exports_info_module.rst +++ b/docs/community.aws.cloudformation_exports_info_module.rst @@ -194,7 +194,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.cloudformation_stack_set_module.rst b/docs/community.aws.cloudformation_stack_set_module.rst index 0a5783223d2..d0be29cffb2 100644 --- a/docs/community.aws.cloudformation_stack_set_module.rst +++ b/docs/community.aws.cloudformation_stack_set_module.rst @@ -440,7 +440,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.cloudfront_distribution_module.rst b/docs/community.aws.cloudfront_distribution_module.rst index fa12cc12691..eaedc87c45c 100644 --- a/docs/community.aws.cloudfront_distribution_module.rst +++ b/docs/community.aws.cloudfront_distribution_module.rst @@ -1982,6 +1982,7 @@ Parameters
list + / elements=string
@@ -2026,7 +2027,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.cloudfront_info_module.rst b/docs/community.aws.cloudfront_info_module.rst index f5348b059a6..4600e4fa786 100644 --- a/docs/community.aws.cloudfront_info_module.rst +++ b/docs/community.aws.cloudfront_info_module.rst @@ -472,7 +472,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.cloudfront_invalidation_module.rst b/docs/community.aws.cloudfront_invalidation_module.rst index e1d804ee565..d0a31cedfcb 100644 --- a/docs/community.aws.cloudfront_invalidation_module.rst +++ b/docs/community.aws.cloudfront_invalidation_module.rst @@ -241,7 +241,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
@@ -258,7 +259,7 @@ Parameters -
A list of paths on the distribution to invalidate. Each path should begin with '/'. Wildcards are allowed. eg. '/foo/bar/*'
+
A list of paths on the distribution to invalidate. Each path should begin with /. Wildcards are allowed. eg. /foo/bar/*
diff --git a/docs/community.aws.cloudfront_origin_access_identity_module.rst b/docs/community.aws.cloudfront_origin_access_identity_module.rst index a92325f433b..5a667841ca1 100644 --- a/docs/community.aws.cloudfront_origin_access_identity_module.rst +++ b/docs/community.aws.cloudfront_origin_access_identity_module.rst @@ -239,7 +239,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.cloudfront_response_headers_policy_module.rst b/docs/community.aws.cloudfront_response_headers_policy_module.rst index d2340f6a7b2..3d96305ffe5 100644 --- a/docs/community.aws.cloudfront_response_headers_policy_module.rst +++ b/docs/community.aws.cloudfront_response_headers_policy_module.rst @@ -274,7 +274,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.cloudtrail_module.rst b/docs/community.aws.cloudtrail_module.rst index 10ab8cd1786..cc93099f085 100644 --- a/docs/community.aws.cloudtrail_module.rst +++ b/docs/community.aws.cloudtrail_module.rst @@ -374,7 +374,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.cloudwatchevent_rule_module.rst b/docs/community.aws.cloudwatchevent_rule_module.rst index 254a26bfaa9..62bdccda521 100644 --- a/docs/community.aws.cloudwatchevent_rule_module.rst +++ b/docs/community.aws.cloudwatchevent_rule_module.rst @@ -270,7 +270,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.cloudwatchlogs_log_group_info_module.rst b/docs/community.aws.cloudwatchlogs_log_group_info_module.rst index 5eff72ca74c..ea474ab7f48 100644 --- a/docs/community.aws.cloudwatchlogs_log_group_info_module.rst +++ b/docs/community.aws.cloudwatchlogs_log_group_info_module.rst @@ -209,7 +209,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.cloudwatchlogs_log_group_metric_filter_module.rst b/docs/community.aws.cloudwatchlogs_log_group_metric_filter_module.rst index 853eaee9f48..507d0895aed 100644 --- a/docs/community.aws.cloudwatchlogs_log_group_metric_filter_module.rst +++ b/docs/community.aws.cloudwatchlogs_log_group_metric_filter_module.rst @@ -322,7 +322,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.cloudwatchlogs_log_group_module.rst b/docs/community.aws.cloudwatchlogs_log_group_module.rst index 255afce8613..1b9163cbe39 100644 --- a/docs/community.aws.cloudwatchlogs_log_group_module.rst +++ b/docs/community.aws.cloudwatchlogs_log_group_module.rst @@ -282,7 +282,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.data_pipeline_module.rst b/docs/community.aws.data_pipeline_module.rst index 162bc211a54..deaa3e30a2a 100644 --- a/docs/community.aws.data_pipeline_module.rst +++ b/docs/community.aws.data_pipeline_module.rst @@ -434,7 +434,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.dms_endpoint_module.rst b/docs/community.aws.dms_endpoint_module.rst index 82d10310ee4..6d3f0b50dc2 100644 --- a/docs/community.aws.dms_endpoint_module.rst +++ b/docs/community.aws.dms_endpoint_module.rst @@ -472,7 +472,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.dms_replication_subnet_group_module.rst b/docs/community.aws.dms_replication_subnet_group_module.rst index d88cf7b5932..65ea08c431a 100644 --- a/docs/community.aws.dms_replication_subnet_group_module.rst +++ b/docs/community.aws.dms_replication_subnet_group_module.rst @@ -226,7 +226,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.dynamodb_table_module.rst b/docs/community.aws.dynamodb_table_module.rst index 3a76ee56a00..e66b5da707a 100644 --- a/docs/community.aws.dynamodb_table_module.rst +++ b/docs/community.aws.dynamodb_table_module.rst @@ -531,7 +531,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.dynamodb_ttl_module.rst b/docs/community.aws.dynamodb_ttl_module.rst index 5f0c3f94cb6..4a1de386617 100644 --- a/docs/community.aws.dynamodb_ttl_module.rst +++ b/docs/community.aws.dynamodb_ttl_module.rst @@ -211,7 +211,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_ami_copy_module.rst b/docs/community.aws.ec2_ami_copy_module.rst index 16a171a79dd..d4a730953e0 100644 --- a/docs/community.aws.ec2_ami_copy_module.rst +++ b/docs/community.aws.ec2_ami_copy_module.rst @@ -259,7 +259,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_asg_info_module.rst b/docs/community.aws.ec2_asg_info_module.rst index 878507316f5..78542b7019d 100644 --- a/docs/community.aws.ec2_asg_info_module.rst +++ b/docs/community.aws.ec2_asg_info_module.rst @@ -210,7 +210,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_asg_instance_refresh_info_module.rst b/docs/community.aws.ec2_asg_instance_refresh_info_module.rst index a1ab6b902e5..b3425093db7 100644 --- a/docs/community.aws.ec2_asg_instance_refresh_info_module.rst +++ b/docs/community.aws.ec2_asg_instance_refresh_info_module.rst @@ -258,7 +258,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_asg_instance_refresh_module.rst b/docs/community.aws.ec2_asg_instance_refresh_module.rst index f1387309ee9..a716cc9dc41 100644 --- a/docs/community.aws.ec2_asg_instance_refresh_module.rst +++ b/docs/community.aws.ec2_asg_instance_refresh_module.rst @@ -267,7 +267,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_asg_lifecycle_hook_module.rst b/docs/community.aws.ec2_asg_lifecycle_hook_module.rst index df451167ab8..2b37d85913b 100644 --- a/docs/community.aws.ec2_asg_lifecycle_hook_module.rst +++ b/docs/community.aws.ec2_asg_lifecycle_hook_module.rst @@ -310,7 +310,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_asg_module.rst b/docs/community.aws.ec2_asg_module.rst index 0bcf1260c58..24e25ef4dbc 100644 --- a/docs/community.aws.ec2_asg_module.rst +++ b/docs/community.aws.ec2_asg_module.rst @@ -856,7 +856,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_asg_scheduled_action_module.rst b/docs/community.aws.ec2_asg_scheduled_action_module.rst index f8a2ee6c934..810f3be1463 100644 --- a/docs/community.aws.ec2_asg_scheduled_action_module.rst +++ b/docs/community.aws.ec2_asg_scheduled_action_module.rst @@ -304,7 +304,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_customer_gateway_info_module.rst b/docs/community.aws.ec2_customer_gateway_info_module.rst index f12e9f5f584..d2188f27d51 100644 --- a/docs/community.aws.ec2_customer_gateway_info_module.rst +++ b/docs/community.aws.ec2_customer_gateway_info_module.rst @@ -225,7 +225,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_customer_gateway_module.rst b/docs/community.aws.ec2_customer_gateway_module.rst index a4c47163564..3119afec5f3 100644 --- a/docs/community.aws.ec2_customer_gateway_module.rst +++ b/docs/community.aws.ec2_customer_gateway_module.rst @@ -260,7 +260,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_eip_info_module.rst b/docs/community.aws.ec2_eip_info_module.rst index 57601266b3b..ed95d870d0c 100644 --- a/docs/community.aws.ec2_eip_info_module.rst +++ b/docs/community.aws.ec2_eip_info_module.rst @@ -210,7 +210,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_eip_module.rst b/docs/community.aws.ec2_eip_module.rst index 32488e1a838..bfd87e6fac5 100644 --- a/docs/community.aws.ec2_eip_module.rst +++ b/docs/community.aws.ec2_eip_module.rst @@ -357,7 +357,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_launch_template_module.rst b/docs/community.aws.ec2_launch_template_module.rst index de671ceff0e..ee6146d598b 100644 --- a/docs/community.aws.ec2_launch_template_module.rst +++ b/docs/community.aws.ec2_launch_template_module.rst @@ -1279,7 +1279,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_lc_find_module.rst b/docs/community.aws.ec2_lc_find_module.rst index 2603ae037a3..861d5527f15 100644 --- a/docs/community.aws.ec2_lc_find_module.rst +++ b/docs/community.aws.ec2_lc_find_module.rst @@ -229,7 +229,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_lc_info_module.rst b/docs/community.aws.ec2_lc_info_module.rst index b78cad69905..b4d29d22157 100644 --- a/docs/community.aws.ec2_lc_info_module.rst +++ b/docs/community.aws.ec2_lc_info_module.rst @@ -211,7 +211,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_lc_module.rst b/docs/community.aws.ec2_lc_module.rst index 3443059a634..34620560fe4 100644 --- a/docs/community.aws.ec2_lc_module.rst +++ b/docs/community.aws.ec2_lc_module.rst @@ -460,7 +460,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_metric_alarm_module.rst b/docs/community.aws.ec2_metric_alarm_module.rst index a83000d36a2..6940bd76e24 100644 --- a/docs/community.aws.ec2_metric_alarm_module.rst +++ b/docs/community.aws.ec2_metric_alarm_module.rst @@ -378,7 +378,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_placement_group_info_module.rst b/docs/community.aws.ec2_placement_group_info_module.rst index e78e580335f..210dd0f9be1 100644 --- a/docs/community.aws.ec2_placement_group_info_module.rst +++ b/docs/community.aws.ec2_placement_group_info_module.rst @@ -211,7 +211,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
@@ -268,7 +269,8 @@ Examples register: specific_ec2_placement_groups - ansible.builtin.debug: - msg: "{{ specific_ec2_placement_groups | json_query(\"[?name=='my-cluster']\") }}" + msg: > + {{ specific_ec2_placement_groups | json_query("[?name=='my-cluster']") }} diff --git a/docs/community.aws.ec2_placement_group_module.rst b/docs/community.aws.ec2_placement_group_module.rst index 8ef817ba78f..f4a7e5635c3 100644 --- a/docs/community.aws.ec2_placement_group_module.rst +++ b/docs/community.aws.ec2_placement_group_module.rst @@ -228,7 +228,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_scaling_policy_module.rst b/docs/community.aws.ec2_scaling_policy_module.rst index fc9ae46e9ab..4759e283b7a 100644 --- a/docs/community.aws.ec2_scaling_policy_module.rst +++ b/docs/community.aws.ec2_scaling_policy_module.rst @@ -353,7 +353,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_snapshot_copy_module.rst b/docs/community.aws.ec2_snapshot_copy_module.rst index de0984d4be0..8f538cba826 100644 --- a/docs/community.aws.ec2_snapshot_copy_module.rst +++ b/docs/community.aws.ec2_snapshot_copy_module.rst @@ -243,7 +243,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_transit_gateway_info_module.rst b/docs/community.aws.ec2_transit_gateway_info_module.rst index d76a54f7fff..7afa39d9366 100644 --- a/docs/community.aws.ec2_transit_gateway_info_module.rst +++ b/docs/community.aws.ec2_transit_gateway_info_module.rst @@ -209,7 +209,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_transit_gateway_module.rst b/docs/community.aws.ec2_transit_gateway_module.rst index b82648991b5..d286e0dddff 100644 --- a/docs/community.aws.ec2_transit_gateway_module.rst +++ b/docs/community.aws.ec2_transit_gateway_module.rst @@ -322,7 +322,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_vpc_egress_igw_module.rst b/docs/community.aws.ec2_vpc_egress_igw_module.rst index 3c0a49166a4..4a3eaf945ef 100644 --- a/docs/community.aws.ec2_vpc_egress_igw_module.rst +++ b/docs/community.aws.ec2_vpc_egress_igw_module.rst @@ -194,7 +194,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_vpc_nacl_info_module.rst b/docs/community.aws.ec2_vpc_nacl_info_module.rst index 22ee1c3b425..22762de0c4f 100644 --- a/docs/community.aws.ec2_vpc_nacl_info_module.rst +++ b/docs/community.aws.ec2_vpc_nacl_info_module.rst @@ -228,7 +228,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_vpc_nacl_module.rst b/docs/community.aws.ec2_vpc_nacl_module.rst index 46bf7c1ed8f..1984a46383f 100644 --- a/docs/community.aws.ec2_vpc_nacl_module.rst +++ b/docs/community.aws.ec2_vpc_nacl_module.rst @@ -260,7 +260,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_vpc_peer_module.rst b/docs/community.aws.ec2_vpc_peer_module.rst index ba2b087a72d..b4ca12ea668 100644 --- a/docs/community.aws.ec2_vpc_peer_module.rst +++ b/docs/community.aws.ec2_vpc_peer_module.rst @@ -274,7 +274,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_vpc_peering_info_module.rst b/docs/community.aws.ec2_vpc_peering_info_module.rst index 0f872700904..b82603262eb 100644 --- a/docs/community.aws.ec2_vpc_peering_info_module.rst +++ b/docs/community.aws.ec2_vpc_peering_info_module.rst @@ -225,7 +225,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_vpc_route_table_info_module.rst b/docs/community.aws.ec2_vpc_route_table_info_module.rst index 6c025276cdd..fce762c95b2 100644 --- a/docs/community.aws.ec2_vpc_route_table_info_module.rst +++ b/docs/community.aws.ec2_vpc_route_table_info_module.rst @@ -209,7 +209,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_vpc_route_table_module.rst b/docs/community.aws.ec2_vpc_route_table_module.rst index ad82db6dc69..bf2a0bef080 100644 --- a/docs/community.aws.ec2_vpc_route_table_module.rst +++ b/docs/community.aws.ec2_vpc_route_table_module.rst @@ -319,7 +319,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_vpc_vgw_info_module.rst b/docs/community.aws.ec2_vpc_vgw_info_module.rst index ff5fe83dd9a..cff25d179b6 100644 --- a/docs/community.aws.ec2_vpc_vgw_info_module.rst +++ b/docs/community.aws.ec2_vpc_vgw_info_module.rst @@ -209,7 +209,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_vpc_vgw_module.rst b/docs/community.aws.ec2_vpc_vgw_module.rst index b2f79d74467..549c223e48d 100644 --- a/docs/community.aws.ec2_vpc_vgw_module.rst +++ b/docs/community.aws.ec2_vpc_vgw_module.rst @@ -227,7 +227,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_vpc_vpn_info_module.rst b/docs/community.aws.ec2_vpc_vpn_info_module.rst index fbf5aa8bded..3bd0ed0573b 100644 --- a/docs/community.aws.ec2_vpc_vpn_info_module.rst +++ b/docs/community.aws.ec2_vpc_vpn_info_module.rst @@ -209,7 +209,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_vpc_vpn_module.rst b/docs/community.aws.ec2_vpc_vpn_module.rst index 41e63c77d02..cdce1882c5d 100644 --- a/docs/community.aws.ec2_vpc_vpn_module.rst +++ b/docs/community.aws.ec2_vpc_vpn_module.rst @@ -472,7 +472,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ec2_win_password_module.rst b/docs/community.aws.ec2_win_password_module.rst index 4a1dbaf0138..5c471d0a29b 100644 --- a/docs/community.aws.ec2_win_password_module.rst +++ b/docs/community.aws.ec2_win_password_module.rst @@ -258,7 +258,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ecs_attribute_module.rst b/docs/community.aws.ecs_attribute_module.rst index 361dec81081..08e3ac16dd5 100644 --- a/docs/community.aws.ecs_attribute_module.rst +++ b/docs/community.aws.ecs_attribute_module.rst @@ -277,7 +277,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ecs_cluster_module.rst b/docs/community.aws.ecs_cluster_module.rst index be911836938..f86c003f005 100644 --- a/docs/community.aws.ecs_cluster_module.rst +++ b/docs/community.aws.ecs_cluster_module.rst @@ -242,7 +242,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ecs_ecr_module.rst b/docs/community.aws.ecs_ecr_module.rst index ed34a339d84..0baf7d0047f 100644 --- a/docs/community.aws.ecs_ecr_module.rst +++ b/docs/community.aws.ecs_ecr_module.rst @@ -356,7 +356,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ecs_service_info_module.rst b/docs/community.aws.ecs_service_info_module.rst index 8ac1c64d3c8..107fdc51d26 100644 --- a/docs/community.aws.ecs_service_info_module.rst +++ b/docs/community.aws.ecs_service_info_module.rst @@ -247,7 +247,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ecs_service_module.rst b/docs/community.aws.ecs_service_module.rst index 511142deeb0..ed5945a09c7 100644 --- a/docs/community.aws.ecs_service_module.rst +++ b/docs/community.aws.ecs_service_module.rst @@ -648,7 +648,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ecs_tag_module.rst b/docs/community.aws.ecs_tag_module.rst index bd2af4fbcd1..cb408a3855f 100644 --- a/docs/community.aws.ecs_tag_module.rst +++ b/docs/community.aws.ecs_tag_module.rst @@ -269,7 +269,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ecs_task_module.rst b/docs/community.aws.ecs_task_module.rst index ddddc1bcb80..fc8c5c0fb3d 100644 --- a/docs/community.aws.ecs_task_module.rst +++ b/docs/community.aws.ecs_task_module.rst @@ -370,7 +370,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ecs_taskdefinition_info_module.rst b/docs/community.aws.ecs_taskdefinition_info_module.rst index 972444abb20..07ca93d0998 100644 --- a/docs/community.aws.ecs_taskdefinition_info_module.rst +++ b/docs/community.aws.ecs_taskdefinition_info_module.rst @@ -194,7 +194,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.ecs_taskdefinition_module.rst b/docs/community.aws.ecs_taskdefinition_module.rst index 9408d0a0579..8b670e9133f 100644 --- a/docs/community.aws.ecs_taskdefinition_module.rst +++ b/docs/community.aws.ecs_taskdefinition_module.rst @@ -152,12 +152,13 @@ Parameters
list + / elements=string
-
The command that is passed to the container.
+
The command that is passed to the container. If there are multiple arguments, each argument is a separated string in the array.
@@ -265,6 +266,7 @@ Parameters
list + / elements=string
@@ -282,6 +284,7 @@ Parameters
list + / elements=string
@@ -315,6 +318,7 @@ Parameters
list + / elements=string
@@ -594,6 +598,7 @@ Parameters
list + / elements=string
@@ -646,6 +651,7 @@ Parameters
list + / elements=string
@@ -705,6 +711,7 @@ Parameters
list + / elements=string
@@ -820,6 +827,7 @@ Parameters
list + / elements=string
@@ -952,6 +960,7 @@ Parameters
list + / elements=string
@@ -1372,15 +1381,55 @@ Parameters
list + / elements=dictionary
The type and amount of a resource to assign to a container.
-
The only supported resource is a GPU.
+
The only supported resources are GPU and InferenceAccelerator.
+ + + + + + +
+ type + +
+ string +
+ + +
    Choices: +
  • GPU
  • +
  • InferenceAccelerator
  • +
+ + +
The type of resource to assign to a container.
+ + + + +
+ value + +
+ string +
+ + + + +
The value for the specified resource type.
+ + + @@ -1527,6 +1576,7 @@ Parameters
list + / elements=dictionary
@@ -1535,6 +1585,41 @@ Parameters
A list of namespaced kernel parameters to set in the container.
+ + + + +
+ namespace + +
+ string +
+ + + + +
The namespaced kernel parameter to set a value for.
+ + + + + + +
+ value + +
+ string +
+ + + + +
The value for the namespaced kernel parameter that's specified in namespace.
+ + + @@ -1987,7 +2072,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.efs_info_module.rst b/docs/community.aws.efs_info_module.rst index 25831239c3f..8abc230039d 100644 --- a/docs/community.aws.efs_info_module.rst +++ b/docs/community.aws.efs_info_module.rst @@ -225,7 +225,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.efs_module.rst b/docs/community.aws.efs_module.rst index 92e6fef6493..aa263c7adf6 100644 --- a/docs/community.aws.efs_module.rst +++ b/docs/community.aws.efs_module.rst @@ -311,7 +311,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.efs_tag_module.rst b/docs/community.aws.efs_tag_module.rst index 33c03f40204..c0d7ffe308b 100644 --- a/docs/community.aws.efs_tag_module.rst +++ b/docs/community.aws.efs_tag_module.rst @@ -231,7 +231,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.elasticache_info_module.rst b/docs/community.aws.elasticache_info_module.rst index 013b434b066..0e8f5e735e0 100644 --- a/docs/community.aws.elasticache_info_module.rst +++ b/docs/community.aws.elasticache_info_module.rst @@ -209,7 +209,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.elasticache_module.rst b/docs/community.aws.elasticache_module.rst index 7bec854fee7..038f73033bc 100644 --- a/docs/community.aws.elasticache_module.rst +++ b/docs/community.aws.elasticache_module.rst @@ -376,7 +376,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.elasticache_parameter_group_module.rst b/docs/community.aws.elasticache_parameter_group_module.rst index 18c49da7641..54bb625efae 100644 --- a/docs/community.aws.elasticache_parameter_group_module.rst +++ b/docs/community.aws.elasticache_parameter_group_module.rst @@ -250,7 +250,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.elasticache_snapshot_module.rst b/docs/community.aws.elasticache_snapshot_module.rst index 1dbe4051b9f..75db405fbfb 100644 --- a/docs/community.aws.elasticache_snapshot_module.rst +++ b/docs/community.aws.elasticache_snapshot_module.rst @@ -256,7 +256,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.elasticache_subnet_group_module.rst b/docs/community.aws.elasticache_subnet_group_module.rst index 4070d3c19c9..549f2252308 100644 --- a/docs/community.aws.elasticache_subnet_group_module.rst +++ b/docs/community.aws.elasticache_subnet_group_module.rst @@ -227,7 +227,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.elb_application_lb_info_module.rst b/docs/community.aws.elb_application_lb_info_module.rst index 052635debc9..d730562be35 100644 --- a/docs/community.aws.elb_application_lb_info_module.rst +++ b/docs/community.aws.elb_application_lb_info_module.rst @@ -226,7 +226,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.elb_application_lb_module.rst b/docs/community.aws.elb_application_lb_module.rst index 786ff18c2a2..e6017235c54 100644 --- a/docs/community.aws.elb_application_lb_module.rst +++ b/docs/community.aws.elb_application_lb_module.rst @@ -526,6 +526,7 @@ Parameters
list + / elements=dictionary
@@ -543,6 +544,7 @@ Parameters
list + / elements=dictionary
@@ -746,7 +748,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.elb_classic_lb_info_module.rst b/docs/community.aws.elb_classic_lb_info_module.rst index 723d7b5aaa4..7693d363d33 100644 --- a/docs/community.aws.elb_classic_lb_info_module.rst +++ b/docs/community.aws.elb_classic_lb_info_module.rst @@ -210,7 +210,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.elb_instance_module.rst b/docs/community.aws.elb_instance_module.rst index 4b6e79fa888..d40cdff3d52 100644 --- a/docs/community.aws.elb_instance_module.rst +++ b/docs/community.aws.elb_instance_module.rst @@ -248,7 +248,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.elb_network_lb_module.rst b/docs/community.aws.elb_network_lb_module.rst index d2e7e6ba31a..f30a7b1262a 100644 --- a/docs/community.aws.elb_network_lb_module.rst +++ b/docs/community.aws.elb_network_lb_module.rst @@ -483,7 +483,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.elb_target_group_info_module.rst b/docs/community.aws.elb_target_group_info_module.rst index b5453f14c47..2bce3eccf3a 100644 --- a/docs/community.aws.elb_target_group_info_module.rst +++ b/docs/community.aws.elb_target_group_info_module.rst @@ -244,7 +244,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.elb_target_group_module.rst b/docs/community.aws.elb_target_group_module.rst index 9232f9e4b3e..7715da4da29 100644 --- a/docs/community.aws.elb_target_group_module.rst +++ b/docs/community.aws.elb_target_group_module.rst @@ -502,7 +502,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.elb_target_info_module.rst b/docs/community.aws.elb_target_info_module.rst index d2898313623..41e2bc751f4 100644 --- a/docs/community.aws.elb_target_info_module.rst +++ b/docs/community.aws.elb_target_info_module.rst @@ -229,7 +229,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.elb_target_module.rst b/docs/community.aws.elb_target_module.rst index 82893b41cd3..5a4d2ca0d86 100644 --- a/docs/community.aws.elb_target_module.rst +++ b/docs/community.aws.elb_target_module.rst @@ -214,7 +214,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.execute_lambda_module.rst b/docs/community.aws.execute_lambda_module.rst index baaa304c7e6..d4565df547e 100644 --- a/docs/community.aws.execute_lambda_module.rst +++ b/docs/community.aws.execute_lambda_module.rst @@ -259,7 +259,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
@@ -400,11 +401,27 @@ Common return values are documented `here - Key + Key Returned Description + +
+ result + +
+ dictionary +
+ + success + +
Resulting data structure from a successful task execution.
+
+ + + +  
logs @@ -415,11 +432,12 @@ Common return values are documented `here if tail_log == true -
The last 4KB of the function logs. Only provided if tail_log is true
+
The last 4KB of the function logs. Only provided if tail_log is true

+  
output @@ -437,6 +455,7 @@ Common return values are documented `here +  
status @@ -453,6 +472,7 @@ Common return values are documented `here 200 +

diff --git a/docs/community.aws.iam_access_key_info_module.rst b/docs/community.aws.iam_access_key_info_module.rst index bd075581397..e8ca9b6a6f2 100644 --- a/docs/community.aws.iam_access_key_info_module.rst +++ b/docs/community.aws.iam_access_key_info_module.rst @@ -195,7 +195,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.iam_access_key_module.rst b/docs/community.aws.iam_access_key_module.rst index 07ae69d7817..6c0944c5257 100644 --- a/docs/community.aws.iam_access_key_module.rst +++ b/docs/community.aws.iam_access_key_module.rst @@ -253,7 +253,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.iam_group_module.rst b/docs/community.aws.iam_group_module.rst index 4a630b93aa8..6d913731c2c 100644 --- a/docs/community.aws.iam_group_module.rst +++ b/docs/community.aws.iam_group_module.rst @@ -267,7 +267,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.iam_managed_policy_module.rst b/docs/community.aws.iam_managed_policy_module.rst index 75c8fca73d1..db3aa1dcefe 100644 --- a/docs/community.aws.iam_managed_policy_module.rst +++ b/docs/community.aws.iam_managed_policy_module.rst @@ -298,7 +298,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.iam_mfa_device_info_module.rst b/docs/community.aws.iam_mfa_device_info_module.rst index 4dc8cc7cdf7..903756f6342 100644 --- a/docs/community.aws.iam_mfa_device_info_module.rst +++ b/docs/community.aws.iam_mfa_device_info_module.rst @@ -194,7 +194,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.iam_password_policy_module.rst b/docs/community.aws.iam_password_policy_module.rst index 38091ba8b9e..c2685d8751b 100644 --- a/docs/community.aws.iam_password_policy_module.rst +++ b/docs/community.aws.iam_password_policy_module.rst @@ -361,7 +361,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.iam_policy_info_module.rst b/docs/community.aws.iam_policy_info_module.rst index d49c5ff6d2c..4272a26fd7f 100644 --- a/docs/community.aws.iam_policy_info_module.rst +++ b/docs/community.aws.iam_policy_info_module.rst @@ -246,7 +246,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.iam_policy_module.rst b/docs/community.aws.iam_policy_module.rst index 83347730bec..f20bad8cad5 100644 --- a/docs/community.aws.iam_policy_module.rst +++ b/docs/community.aws.iam_policy_module.rst @@ -282,7 +282,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
@@ -375,8 +376,7 @@ Examples # Advanced example, create two new groups and add a READ-ONLY policy to both # groups. - name: Create Two Groups, Mario and Luigi - community.aws.iam: - iam_type: group + community.aws.iam_group: name: "{{ item }}" state: present loop: @@ -387,9 +387,9 @@ Examples - name: Apply READ-ONLY policy to new groups that have been recently created community.aws.iam_policy: iam_type: group - iam_name: "{{ item.created_group.group_name }}" + iam_name: "{{ item.iam_group.group.group_name }}" policy_name: "READ-ONLY" - policy_document: readonlypolicy.json + policy_json: "{{ lookup('template', 'readonly.json.j2') }}" state: present loop: "{{ new_groups.results }}" @@ -400,13 +400,44 @@ Examples iam_name: "{{ item.user }}" policy_name: "s3_limited_access_{{ item.prefix }}" state: present - policy_json: " {{ lookup( 'template', 's3_policy.json.j2') }} " + policy_json: "{{ lookup('template', 's3_policy.json.j2') }}" loop: - user: s3_user prefix: s3_user_prefix +Return Values +------------- +Common return values are documented `here `_, the following are the fields unique to this module: + +.. raw:: html + + + + + + + + + + + + +
KeyReturnedDescription
+
+ policies + +
+ list + / elements=string +
+
always +
A list of names of the inline policies embedded in the specified IAM resource (user, group, or role).
+
+
+

+ Status ------ diff --git a/docs/community.aws.iam_role_info_module.rst b/docs/community.aws.iam_role_info_module.rst index f5f83a69ccf..12c8919b973 100644 --- a/docs/community.aws.iam_role_info_module.rst +++ b/docs/community.aws.iam_role_info_module.rst @@ -227,7 +227,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.iam_role_module.rst b/docs/community.aws.iam_role_module.rst index eab0244a87d..b7bc10ba559 100644 --- a/docs/community.aws.iam_role_module.rst +++ b/docs/community.aws.iam_role_module.rst @@ -390,7 +390,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.iam_saml_federation_module.rst b/docs/community.aws.iam_saml_federation_module.rst index d31f15848f8..6bd70075ea7 100644 --- a/docs/community.aws.iam_saml_federation_module.rst +++ b/docs/community.aws.iam_saml_federation_module.rst @@ -225,7 +225,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.iam_server_certificate_info_module.rst b/docs/community.aws.iam_server_certificate_info_module.rst index 0a3949e5bb3..f1e90f5278b 100644 --- a/docs/community.aws.iam_server_certificate_info_module.rst +++ b/docs/community.aws.iam_server_certificate_info_module.rst @@ -209,7 +209,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.iam_server_certificate_module.rst b/docs/community.aws.iam_server_certificate_module.rst index 1de944cc42b..ea0a05de315 100644 --- a/docs/community.aws.iam_server_certificate_module.rst +++ b/docs/community.aws.iam_server_certificate_module.rst @@ -330,7 +330,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.iam_user_info_module.rst b/docs/community.aws.iam_user_info_module.rst index 2b192883b81..22d2d9c2494 100644 --- a/docs/community.aws.iam_user_info_module.rst +++ b/docs/community.aws.iam_user_info_module.rst @@ -241,7 +241,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.iam_user_module.rst b/docs/community.aws.iam_user_module.rst index 4265cb385ef..674e22f2763 100644 --- a/docs/community.aws.iam_user_module.rst +++ b/docs/community.aws.iam_user_module.rst @@ -18,7 +18,7 @@ Version added: 1.0.0 Synopsis -------- - A module to manage AWS IAM users. -- The module does not manage groups that users belong to, groups memberships can be managed using `iam_group`. +- The module does not manage groups that users belong to, groups memberships can be managed using :ref:`community.aws.iam_group `. @@ -326,7 +326,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
@@ -465,7 +466,7 @@ Examples # Note: These examples do not set authentication details, see the AWS Guide for details. # Note: This module does not allow management of groups that users belong to. - # Groups should manage their membership directly using `iam_group`, + # Groups should manage their membership directly using community.aws.iam_group, # as users belong to them. - name: Create a user @@ -602,7 +603,7 @@ Common return values are documented `here user tags
Sample:
-
{"Env": "Prod"}
+
{'Env': 'Prod'}
diff --git a/docs/community.aws.kinesis_stream_module.rst b/docs/community.aws.kinesis_stream_module.rst index eb8e1970496..be60788780e 100644 --- a/docs/community.aws.kinesis_stream_module.rst +++ b/docs/community.aws.kinesis_stream_module.rst @@ -285,7 +285,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.lambda_alias_module.rst b/docs/community.aws.lambda_alias_module.rst index 205a8cca114..33e45350b6e 100644 --- a/docs/community.aws.lambda_alias_module.rst +++ b/docs/community.aws.lambda_alias_module.rst @@ -258,7 +258,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.lambda_event_module.rst b/docs/community.aws.lambda_event_module.rst index b03465d8bf5..dccda5bc0f0 100644 --- a/docs/community.aws.lambda_event_module.rst +++ b/docs/community.aws.lambda_event_module.rst @@ -248,7 +248,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.lambda_info_module.rst b/docs/community.aws.lambda_info_module.rst index 07fa4405694..950a831996d 100644 --- a/docs/community.aws.lambda_info_module.rst +++ b/docs/community.aws.lambda_info_module.rst @@ -250,7 +250,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.lambda_module.rst b/docs/community.aws.lambda_module.rst index 9de93b4b039..9aab90e70f6 100644 --- a/docs/community.aws.lambda_module.rst +++ b/docs/community.aws.lambda_module.rst @@ -206,6 +206,22 @@ Parameters
The function within your code that Lambda calls to begin execution.
+ + +
+ kms_key_arn + +
+ string +
+
added in 3.3.0
+ + + + +
The KMS key ARN used to encrypt the function's environment variables.
+ +
@@ -368,7 +384,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
@@ -591,12 +608,12 @@ Common return values are documented `here - Key + Key Returned Description - +
code @@ -606,14 +623,50 @@ Common return values are documented `here success -
the lambda function location returned by get_function in boto3
+
The lambda function's code returned by get_function in boto3.
+
+ + + +   + +
+ location + +
+ string +
+ + success + +
The presigned URL you can use to download the function's .zip file that you previously uploaded.
+
The URL is valid for up to 10 minutes.

Sample:
-
{'location': 'a presigned S3 URL', 'repository_type': 'S3'}
+
https://prod-04-2014-tasks.s3.us-east-1.amazonaws.com/snapshots/sample
- +   + +
+ repository_type + +
+ string +
+ + success + +
The repository from which you can download the function.
+
+
Sample:
+
S3
+ + + + +
configuration @@ -623,12 +676,429 @@ Common return values are documented `here success -
the lambda function metadata returned by get_function in boto3
+
the lambda function's configuration metadata returned by get_function in boto3
+
+ + + +   + +
+ code_sha256 + +
+ string +
+ + success + +
The SHA256 hash of the function's deployment package.
+
+
Sample:
+
zOAGfF5JLFuzZoSNirUtOrQp+S341IOA3BcoXXoaIaU=
+ + + +   + +
+ code_size + +
+ integer +
+ + success + +
The size of the function's deployment package in bytes.
+
+
Sample:
+
123
+ + + +   + +
+ dead_letter_config + +
+ dictionary +
+ + when the function has a dead letter queue configured + +
The function's dead letter queue.
+
+
Sample:
+
{'target_arn': 'arn:aws:lambda:us-east-1:123456789012:function:myFunction:1'}
+ + + +   +   + +
+ target_arn + +
+ string +
+ + when the function has a dead letter queue configured + +
The ARN of an SQS queue or SNS topic.
+
+
Sample:
+
arn:aws:lambda:us-east-1:123456789012:function:myFunction:1
+ + + + +   + +
+ description + +
+ string +
+ + success + +
The function's description.
+
+
Sample:
+
My function
+ + + +   + +
+ environment + +
+ dictionary +
+ + when environment variables exist + +
The function's environment variables.
+
+ + + +   +   + +
+ error + +
+ dictionary +
+ + when there is an error applying environment variables + +
Error message for environment variables that could not be applied.
+
+ + + +   +   +   + +
+ error_code + +
+ string +
+ + when there is an error applying environment variables + +
The error code.
+
+ + + +   +   +   + +
+ message + +
+ string +
+ + when there is an error applying environment variables + +
The error message.
+
+ + + + +   +   + +
+ variables + +
+ dictionary +
+ + when environment variables exist + +
Environment variable key-value pairs.

Sample:
-
{'code_sha256': 'zOAGfF5JLFuzZoSNirUtOrQp+S341IOA3BcoXXoaIaU=', 'code_size': 123, 'description': 'My function', 'environment': {'variables': {'key': 'value'}}, 'function_arn': 'arn:aws:lambda:us-east-1:123456789012:function:myFunction:1', 'function_name': 'myFunction', 'handler': 'index.handler', 'last_modified': '2017-08-01T00:00:00.000+0000', 'memory_size': 128, 'revision_id': 'a2x9886d-d48a-4a0c-ab64-82abc005x80c', 'role': 'arn:aws:iam::123456789012:role/lambda_basic_execution', 'runtime': 'nodejs6.10', 'tracing_config': {'mode': 'Active'}, 'timeout': 3, 'version': '1', 'vpc_config': {'security_group_ids': [], 'subnet_ids': [], 'vpc_id': '123'}}
+
{'key': 'value'}
+ + +   + +
+ function_arn + +
+ string +
+ + on success + +
The function's Amazon Resource Name (ARN).
+
+
Sample:
+
arn:aws:lambda:us-east-1:123456789012:function:myFunction:1
+ + + +   + +
+ function_name + +
+ string +
+ + on success + +
The function's name.
+
+
Sample:
+
myFunction
+ + + +   + +
+ handler + +
+ string +
+ + on success + +
The function Lambda calls to begin executing your function.
+
+
Sample:
+
index.handler
+ + + +   + +
+ last_modified + +
+ string +
+ + on success + +
The date and time that the function was last updated, in ISO-8601 format (YYYY-MM-DDThh:mm:ssTZD).
+
+
Sample:
+
2017-08-01T00:00:00.000+0000
+ + + +   + +
+ memory_size + +
+ integer +
+ + on success + +
The memory allocated to the function.
+
+
Sample:
+
128
+ + + +   + +
+ revision_id + +
+ string +
+ + on success + +
The latest updated revision of the function or alias.
+
+
Sample:
+
a2x9886d-d48a-4a0c-ab64-82abc005x80c
+ + + +   + +
+ role + +
+ string +
+ + on success + +
The function's execution role.
+
+
Sample:
+
arn:aws:iam::123456789012:role/lambda_basic_execution
+ + + +   + +
+ runtime + +
+ string +
+ + on success + +
The funtime environment for the Lambda function.
+
+
Sample:
+
nodejs6.10
+ + + +   + +
+ timeout + +
+ integer +
+ + on success + +
The amount of time that Lambda allows a function to run before terminating it.
+
+
Sample:
+
3
+ + + +   + +
+ tracing_config + +
+ dictionary +
+ + on success + +
The function's AWS X-Ray tracing configuration.
+
+
Sample:
+
{'mode': 'Active'}
+ + + +   +   + +
+ mode + +
+ string +
+ + on success + +
The tracing mode.
+
+
Sample:
+
Active
+ + + + +   + +
+ version + +
+ string +
+ + on success + +
The version of the Lambda function.
+
+
Sample:
+
1
+ + + +   + +
+ vpc_config + +
+ dictionary +
+ + on success + +
The function's networking configuration.
+
+
Sample:
+
{'security_group_ids': [], 'subnet_ids': [], 'vpc_id': '123'}
+ + +

diff --git a/docs/community.aws.lambda_policy_module.rst b/docs/community.aws.lambda_policy_module.rst index dc04edcb31c..d488bf23542 100644 --- a/docs/community.aws.lambda_policy_module.rst +++ b/docs/community.aws.lambda_policy_module.rst @@ -279,7 +279,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.lightsail_module.rst b/docs/community.aws.lightsail_module.rst index 82b16871951..18588d29648 100644 --- a/docs/community.aws.lightsail_module.rst +++ b/docs/community.aws.lightsail_module.rst @@ -259,7 +259,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.rds_cluster_info_module.rst b/docs/community.aws.rds_cluster_info_module.rst index acbf1474381..2e68c824d79 100644 --- a/docs/community.aws.rds_cluster_info_module.rst +++ b/docs/community.aws.rds_cluster_info_module.rst @@ -226,7 +226,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.rds_cluster_module.rst b/docs/community.aws.rds_cluster_module.rst index afd59bedc5e..5950628e415 100644 --- a/docs/community.aws.rds_cluster_module.rst +++ b/docs/community.aws.rds_cluster_module.rst @@ -946,7 +946,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.rds_instance_info_module.rst b/docs/community.aws.rds_instance_info_module.rst index 679053cf3bf..159416e62bc 100644 --- a/docs/community.aws.rds_instance_info_module.rst +++ b/docs/community.aws.rds_instance_info_module.rst @@ -225,7 +225,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
@@ -796,6 +797,23 @@ Common return values are documented `here db-AAAAAAAAAAAAAAAAAAAAAAAAAA + +   + +
+ deletion_protection + +
+ boolean +
+
added in 3.3.0
+ + always + +
True if the DB instance has deletion protection enabled, False if not.
+
+ +   diff --git a/docs/community.aws.rds_instance_module.rst b/docs/community.aws.rds_instance_module.rst index f1e2e28e9f8..4892937d38d 100644 --- a/docs/community.aws.rds_instance_module.rst +++ b/docs/community.aws.rds_instance_module.rst @@ -430,6 +430,26 @@ Parameters
Use a botocore.endpoint logger to parse the unique (rather than total) "resource:action" API calls made during a task, outputing the set to the resource_actions key in the task results. Use the aws_resource_action callback to output to total list made during a playbook. The ANSIBLE_DEBUG_BOTOCORE_LOGS environment variable may also be used.
+ + +
+ deletion_protection + +
+ boolean +
+
added in 3.3.0
+ + +
    Choices: +
  • no
  • +
  • yes
  • +
+ + +
A value that indicates whether the DB instance has deletion protection enabled. The database can't be deleted when deletion protection is enabled. By default, deletion protection is disabled.
+ +
@@ -631,6 +651,58 @@ Parameters
Set to True to update your cluster password with master_user_password. Since comparing passwords to determine if it needs to be updated is not possible this is set to False by default to allow idempotence.
+ + +
+ iam_roles + +
+ list + / elements=dictionary +
+
added in 3.3.0
+ + + + +
List of Amazon Web Services Identity and Access Management (IAM) roles to associate with DB instance.
+ + + + + +
+ feature_name + +
+ string + / required +
+ + + + +
The name of the feature associated with the IAM role.
+ + + + + +
+ role_arn + +
+ string + / required +
+ + + + +
The ARN of the IAM role to associate with the DB instance.
+ + +
@@ -1001,6 +1073,26 @@ Parameters
Set to False to retain any enabled cloudwatch logs that aren't specified in the task and are associated with the instance.
+ + +
+ purge_iam_roles + +
+ boolean +
+
added in 3.3.0
+ + +
    Choices: +
  • no ←
  • +
  • yes
  • +
+ + +
Set to True to remove any IAM roles that aren't specified in the task and are associated with the instance.
+ +
@@ -1153,7 +1245,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
@@ -1515,7 +1608,49 @@ Examples vpc_security_group_ids: - sg-0be17ba10c9286b0b purge_security_groups: false - register: result + register: result + + # Add IAM role to db instance + - name: Create IAM policy + community.aws.iam_managed_policy: + policy_name: "my-policy" + policy: "{{ lookup('file','files/policy.json') }}" + state: present + register: iam_policy + + - name: Create IAM role + community.aws.iam_role: + assume_role_policy_document: "{{ lookup('file','files/assume_policy.json') }}" + name: "my-role" + state: present + managed_policy: "{{ iam_policy.policy.arn }}" + register: iam_role + + - name: Create DB instance with added IAM role + community.aws.rds_instance: + id: "my-instance-id" + state: present + engine: postgres + engine_version: 14.2 + username: "{{ username }}" + password: "{{ password }}" + db_instance_class: db.m6g.large + allocated_storage: "{{ allocated_storage }}" + iam_roles: + - role_arn: "{{ iam_role.arn }}" + feature_name: 's3Export' + + - name: Remove IAM role from DB instance + community.aws.rds_instance: + id: "my-instance-id" + state: present + engine: postgres + engine_version: 14.2 + username: "{{ username }}" + password: "{{ password }}" + db_instance_class: db.m6g.large + allocated_storage: "{{ allocated_storage }}" + purge_iam_roles: yes @@ -1994,6 +2129,22 @@ Common return values are documented `here db-UHV3QRNWX4KB6GALCIGRML6QFA + + +
+ deletion_protection + +
+ boolean +
+
added in 3.3.0
+ + always + +
True if the DB instance has deletion protection enabled, False if not.
+
+ +
diff --git a/docs/community.aws.rds_instance_snapshot_module.rst b/docs/community.aws.rds_instance_snapshot_module.rst index 846992c72d1..a7e16c4591b 100644 --- a/docs/community.aws.rds_instance_snapshot_module.rst +++ b/docs/community.aws.rds_instance_snapshot_module.rst @@ -5,7 +5,7 @@ community.aws.rds_instance_snapshot *********************************** -**manage Amazon RDS snapshots.** +**Manage Amazon RDS instance snapshots** Version added: 1.0.0 @@ -111,6 +111,26 @@ Parameters

aliases: ec2_secret_key, secret_key
+ + +
+ copy_tags + +
+ boolean +
+
added in 3.3.0
+ + +
    Choices: +
  • no ←
  • +
  • yes
  • +
+ + +
Whether to copy all tags from source_db_snapshot_identifier to db_instance_identifier.
+ +
@@ -123,7 +143,7 @@ Parameters -
Database instance identifier. Required when state is present.
+
Database instance identifier. Required when creating a snapshot.

aliases: instance_id
@@ -212,7 +232,7 @@ Parameters -
whether to remove tags not present in the tags parameter.
+
whether to remove tags not present in the tags parameter.
@@ -246,7 +266,44 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
+ + + + +
+ source_db_snapshot_identifier + +
+ string +
+
added in 3.3.0
+ + + + +
The identifier of the source DB snapshot.
+
Required when copying a snapshot.
+
If the source snapshot is in the same AWS region as the copy, specify the snapshot's identifier.
+
If the source snapshot is in a different AWS region as the copy, specify the snapshot's ARN.
+

aliases: source_id, source_snapshot_id
+ + + + +
+ source_region + +
+ string +
+
added in 3.3.0
+ + + + +
The region that contains the snapshot to be copied.
@@ -361,6 +418,15 @@ Examples community.aws.rds_instance_snapshot: db_instance_identifier: new-database db_snapshot_identifier: new-database-snapshot + register: snapshot + + - name: Copy snapshot from a different region and copy its tags + community.aws.rds_instance_snapshot: + id: new-database-snapshot-copy + region: us-east-1 + source_id: "{{ snapshot.db_snapshot_arn }}" + source_region: us-east-2 + copy_tags: yes - name: Delete snapshot community.aws.rds_instance_snapshot: @@ -698,6 +764,24 @@ Common return values are documented `here manual + + +
+ source_db_snapshot_identifier + +
+ string +
+
added in 3.3.0
+ + when snapshot is a copy + +
The DB snapshot ARN that the DB snapshot was copied from.
+
+
Sample:
+
arn:aws:rds:us-west-2:123456789012:snapshot:ansible-test-16638696-test-snapshot-source
+ +
@@ -777,3 +861,5 @@ Authors - Will Thames (@willthames) - Michael De La Rue (@mikedlr) +- Alina Buzachis (@alinabuzachis) +- Joseph Torcasso (@jatorcasso) diff --git a/docs/community.aws.rds_option_group_info_module.rst b/docs/community.aws.rds_option_group_info_module.rst index b53709f69c8..3c29a1dba5b 100644 --- a/docs/community.aws.rds_option_group_info_module.rst +++ b/docs/community.aws.rds_option_group_info_module.rst @@ -277,7 +277,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.rds_option_group_module.rst b/docs/community.aws.rds_option_group_module.rst index 8b4684bd3a2..a2ca63dd754 100644 --- a/docs/community.aws.rds_option_group_module.rst +++ b/docs/community.aws.rds_option_group_module.rst @@ -252,6 +252,7 @@ Parameters
list + / elements=string
@@ -284,6 +285,7 @@ Parameters
list + / elements=dictionary
@@ -494,6 +496,7 @@ Parameters
list + / elements=string
@@ -570,7 +573,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.rds_param_group_module.rst b/docs/community.aws.rds_param_group_module.rst index 995c6ac3cfc..68eeaa794fd 100644 --- a/docs/community.aws.rds_param_group_module.rst +++ b/docs/community.aws.rds_param_group_module.rst @@ -298,7 +298,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.rds_snapshot_info_module.rst b/docs/community.aws.rds_snapshot_info_module.rst index afe7160c727..02efd9ac0e2 100644 --- a/docs/community.aws.rds_snapshot_info_module.rst +++ b/docs/community.aws.rds_snapshot_info_module.rst @@ -260,7 +260,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.rds_subnet_group_module.rst b/docs/community.aws.rds_subnet_group_module.rst index dbf774ff2f5..099e8107781 100644 --- a/docs/community.aws.rds_subnet_group_module.rst +++ b/docs/community.aws.rds_subnet_group_module.rst @@ -247,7 +247,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.redshift_cross_region_snapshots_module.rst b/docs/community.aws.redshift_cross_region_snapshots_module.rst index d6b0e3599b6..a909a554711 100644 --- a/docs/community.aws.redshift_cross_region_snapshots_module.rst +++ b/docs/community.aws.redshift_cross_region_snapshots_module.rst @@ -230,7 +230,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.redshift_info_module.rst b/docs/community.aws.redshift_info_module.rst index 458b4fd1aac..2fa926a9519 100644 --- a/docs/community.aws.redshift_info_module.rst +++ b/docs/community.aws.redshift_info_module.rst @@ -211,7 +211,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.redshift_module.rst b/docs/community.aws.redshift_module.rst index bb86f34d73f..2d26219aaa2 100644 --- a/docs/community.aws.redshift_module.rst +++ b/docs/community.aws.redshift_module.rst @@ -606,7 +606,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.redshift_subnet_group_module.rst b/docs/community.aws.redshift_subnet_group_module.rst index 2c462b909aa..a7bf1665b8a 100644 --- a/docs/community.aws.redshift_subnet_group_module.rst +++ b/docs/community.aws.redshift_subnet_group_module.rst @@ -227,7 +227,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.route53_health_check_module.rst b/docs/community.aws.route53_health_check_module.rst index ca14e3a9610..2e6a02170f5 100644 --- a/docs/community.aws.route53_health_check_module.rst +++ b/docs/community.aws.route53_health_check_module.rst @@ -209,7 +209,7 @@ Parameters -
Domain name of the endpoint to check. Either this or ip_address has to be provided. When both are given the `fqdn` is used in the `Host:` header of the HTTP request.
+
Domain name of the endpoint to check. Either this or ip_address has to be provided. When both are given the fqdn is used in the Host: header of the HTTP request.
@@ -348,7 +348,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.route53_info_module.rst b/docs/community.aws.route53_info_module.rst index 31f53b92b7a..3820684cfb1 100644 --- a/docs/community.aws.route53_info_module.rst +++ b/docs/community.aws.route53_info_module.rst @@ -392,7 +392,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.route53_module.rst b/docs/community.aws.route53_module.rst index aa99a6cd090..04a92b80d4a 100644 --- a/docs/community.aws.route53_module.rst +++ b/docs/community.aws.route53_module.rst @@ -37,12 +37,12 @@ Parameters - + - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - - - - - - - - - - - - - - + + + + + + diff --git a/docs/community.aws.s3_bucket_notification_module.rst b/docs/community.aws.s3_bucket_notification_module.rst index 9150bbda3d7..a5e6bc9a31e 100644 --- a/docs/community.aws.s3_bucket_notification_module.rst +++ b/docs/community.aws.s3_bucket_notification_module.rst @@ -338,7 +338,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.s3_lifecycle_module.rst b/docs/community.aws.s3_lifecycle_module.rst index 6bb0c716b70..873c1e0cd4c 100644 --- a/docs/community.aws.s3_lifecycle_module.rst +++ b/docs/community.aws.s3_lifecycle_module.rst @@ -423,7 +423,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.s3_logging_module.rst b/docs/community.aws.s3_logging_module.rst index cb5df057e49..5c9da2c28c9 100644 --- a/docs/community.aws.s3_logging_module.rst +++ b/docs/community.aws.s3_logging_module.rst @@ -210,7 +210,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.s3_metrics_configuration_module.rst b/docs/community.aws.s3_metrics_configuration_module.rst index 45a02c9c659..557e178261f 100644 --- a/docs/community.aws.s3_metrics_configuration_module.rst +++ b/docs/community.aws.s3_metrics_configuration_module.rst @@ -257,7 +257,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.s3_sync_module.rst b/docs/community.aws.s3_sync_module.rst index 9027e8c1a93..5d3cba5a704 100644 --- a/docs/community.aws.s3_sync_module.rst +++ b/docs/community.aws.s3_sync_module.rst @@ -211,7 +211,7 @@ Parameters @@ -269,7 +269,7 @@ Parameters @@ -409,7 +409,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.s3_website_module.rst b/docs/community.aws.s3_website_module.rst index f595a808d6b..89d55d04a68 100644 --- a/docs/community.aws.s3_website_module.rst +++ b/docs/community.aws.s3_website_module.rst @@ -240,7 +240,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.sns_module.rst b/docs/community.aws.sns_module.rst index ea41bb67d83..d73d2452ff1 100644 --- a/docs/community.aws.sns_module.rst +++ b/docs/community.aws.sns_module.rst @@ -338,7 +338,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.sns_topic_info_module.rst b/docs/community.aws.sns_topic_info_module.rst index 1e230294287..9dc1f4a5956 100644 --- a/docs/community.aws.sns_topic_info_module.rst +++ b/docs/community.aws.sns_topic_info_module.rst @@ -194,7 +194,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.sns_topic_module.rst b/docs/community.aws.sns_topic_module.rst index 8ebe5f821d0..06eee2698d9 100644 --- a/docs/community.aws.sns_topic_module.rst +++ b/docs/community.aws.sns_topic_module.rst @@ -512,7 +512,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.sqs_queue_module.rst b/docs/community.aws.sqs_queue_module.rst index 7f5f5dcfcfc..ac618c2b373 100644 --- a/docs/community.aws.sqs_queue_module.rst +++ b/docs/community.aws.sqs_queue_module.rst @@ -396,7 +396,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.sts_assume_role_module.rst b/docs/community.aws.sts_assume_role_module.rst index ce482222bae..49729f70119 100644 --- a/docs/community.aws.sts_assume_role_module.rst +++ b/docs/community.aws.sts_assume_role_module.rst @@ -303,7 +303,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.sts_session_token_module.rst b/docs/community.aws.sts_session_token_module.rst index b0702b27f88..294a656793a 100644 --- a/docs/community.aws.sts_session_token_module.rst +++ b/docs/community.aws.sts_session_token_module.rst @@ -239,7 +239,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.wafv2_ip_set_info_module.rst b/docs/community.aws.wafv2_ip_set_info_module.rst index e988b6a2588..c0ad0fcacfb 100644 --- a/docs/community.aws.wafv2_ip_set_info_module.rst +++ b/docs/community.aws.wafv2_ip_set_info_module.rst @@ -230,7 +230,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.wafv2_ip_set_module.rst b/docs/community.aws.wafv2_ip_set_module.rst index 967651d60f0..feee041bc33 100644 --- a/docs/community.aws.wafv2_ip_set_module.rst +++ b/docs/community.aws.wafv2_ip_set_module.rst @@ -302,7 +302,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.wafv2_resources_info_module.rst b/docs/community.aws.wafv2_resources_info_module.rst index 94535f2545c..c71ee099b44 100644 --- a/docs/community.aws.wafv2_resources_info_module.rst +++ b/docs/community.aws.wafv2_resources_info_module.rst @@ -230,7 +230,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.wafv2_resources_module.rst b/docs/community.aws.wafv2_resources_module.rst index 8b6bab30e17..1d76ab9ce05 100644 --- a/docs/community.aws.wafv2_resources_module.rst +++ b/docs/community.aws.wafv2_resources_module.rst @@ -244,7 +244,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.wafv2_rule_group_info_module.rst b/docs/community.aws.wafv2_rule_group_info_module.rst index 93a9c94101f..976fc00449e 100644 --- a/docs/community.aws.wafv2_rule_group_info_module.rst +++ b/docs/community.aws.wafv2_rule_group_info_module.rst @@ -230,7 +230,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.wafv2_rule_group_module.rst b/docs/community.aws.wafv2_rule_group_module.rst index 2cdb7c83316..a7e0985327e 100644 --- a/docs/community.aws.wafv2_rule_group_module.rst +++ b/docs/community.aws.wafv2_rule_group_module.rst @@ -349,7 +349,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.wafv2_web_acl_info_module.rst b/docs/community.aws.wafv2_web_acl_info_module.rst index 7f8f4df2d17..829b9effcc8 100644 --- a/docs/community.aws.wafv2_web_acl_info_module.rst +++ b/docs/community.aws.wafv2_web_acl_info_module.rst @@ -230,7 +230,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/docs/community.aws.wafv2_web_acl_module.rst b/docs/community.aws.wafv2_web_acl_module.rst index 7ed19e0e3fe..ba88b68acfa 100644 --- a/docs/community.aws.wafv2_web_acl_module.rst +++ b/docs/community.aws.wafv2_web_acl_module.rst @@ -455,7 +455,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
diff --git a/galaxy.yml b/galaxy.yml index 1af0a5e86f0..98fd8824440 100644 --- a/galaxy.yml +++ b/galaxy.yml @@ -1,6 +1,6 @@ namespace: community name: aws -version: 3.2.1 +version: 3.3.0 readme: README.md authors: - Ansible (https://github.com/ansible) @@ -8,7 +8,7 @@ description: null license_file: COPYING tags: [community, aws, cloud, amazon] dependencies: - amazon.aws: '>=3.2.0' + amazon.aws: '>=3.3.0' repository: https://github.com/ansible-collections/community.aws documentation: https://github.com/ansible-collections/community.aws/tree/main/docs homepage: https://github.com/ansible-collections/community.aws
ParameterParameter Choices/Defaults Comments
+
alias @@ -63,7 +63,7 @@ Parameters
+
alias_evaluate_target_health @@ -82,7 +82,7 @@ Parameters
+
alias_hosted_zone_id @@ -97,7 +97,7 @@ Parameters
+
aws_access_key @@ -115,7 +115,7 @@ Parameters
+
aws_ca_bundle @@ -132,7 +132,7 @@ Parameters
+
aws_config @@ -149,7 +149,7 @@ Parameters
+
aws_secret_key @@ -167,7 +167,7 @@ Parameters
+
debug_botocore_endpoint_logs @@ -186,7 +186,7 @@ Parameters
+
ec2_url @@ -202,7 +202,7 @@ Parameters
+
failover @@ -222,7 +222,77 @@ Parameters
+
+ geo_location + +
+ dictionary +
+
added in 3.3.0
+
+ +
Allows to control how Amazon Route 53 responds to DNS queries based on the geographic origin of the query.
+
Two geolocation resource record sets that specify same geographic location cannot be created.
+
Non-geolocation resource record sets that have the same values for the Name and Type elements as geolocation resource record sets cannot be created.
+
+
+ continent_code + +
+ string +
+
+ +
The two-letter code for the continent.
+
Specifying continent_code with either country_code or subdivision_code returns an InvalidInput error.
+
+
+ country_code + +
+ string +
+
+ +
The two-letter code for a country.
+
Amazon Route 53 uses the two-letter country codes that are specified in ISO standard 3166-1 alpha-2 .
+
+
+ subdivision_code + +
+ string +
+
+ +
The two-letter code for a state of the United States.
+
To specify subdivision_code, country_code must be set to US.
+
health_check @@ -237,7 +307,7 @@ Parameters
+
hosted_zone_id @@ -253,7 +323,7 @@ Parameters
+
identifier @@ -268,7 +338,7 @@ Parameters
+
overwrite @@ -287,7 +357,7 @@ Parameters
+
private_zone @@ -307,7 +377,7 @@ Parameters
+
profile @@ -324,7 +394,7 @@ Parameters
+
record @@ -340,7 +410,7 @@ Parameters
+
region @@ -356,7 +426,7 @@ Parameters
+
retry_interval @@ -372,7 +442,7 @@ Parameters
+
security_token @@ -386,11 +456,12 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
+
state @@ -414,7 +485,7 @@ Parameters
+
ttl @@ -431,7 +502,7 @@ Parameters
+
type @@ -460,7 +531,7 @@ Parameters
+
validate_certs @@ -479,7 +550,7 @@ Parameters
+
value @@ -495,7 +566,7 @@ Parameters
+
vpc_id @@ -511,7 +582,7 @@ Parameters
+
wait @@ -530,7 +601,7 @@ Parameters
+
wait_timeout @@ -546,7 +617,7 @@ Parameters
+
weight @@ -562,7 +633,7 @@ Parameters
+
zone @@ -729,6 +800,29 @@ Examples - 0 issue "ca.example.net" - 0 issuewild ";" - 0 iodef "mailto:security@example.com" + - name: Create a record with geo_location - country_code + community.aws.route53: + state: present + zone: '{{ zone_one }}' + record: 'geo-test.{{ zone_one }}' + identifier: "geohost@www" + type: A + value: 1.1.1.1 + ttl: 30 + geo_location: + country_code: US + - name: Create a record with geo_location - subdivision code + community.aws.route53: + state: present + zone: '{{ zone_one }}' + record: 'geo-test.{{ zone_one }}' + identifier: "geohost@www" + type: A + value: 1.1.1.1 + ttl: 30 + geo_location: + country_code: US + subdivision_code: TX @@ -810,6 +904,25 @@ Common return values are documented `here PRIMARY
  +
+ geo_location + +
+ dictionary +
+
added in 3.3.0
+
when configured +
geograpic location based on which Route53 resonds to DNS queries.
+
+
Sample:
+
{'continent_code': 'NA', 'country_code': 'US', 'subdivision_code': 'CA'}
+
  diff --git a/docs/community.aws.route53_zone_module.rst b/docs/community.aws.route53_zone_module.rst index ca8a9e81abe..93ce1067531 100644 --- a/docs/community.aws.route53_zone_module.rst +++ b/docs/community.aws.route53_zone_module.rst @@ -262,7 +262,8 @@ Parameters
AWS STS security token. If not set then the value of the AWS_SECURITY_TOKEN or EC2_SECURITY_TOKEN environment variable is used.
If profile is set this parameter is ignored.
Passing the security_token and profile options at the same time has been deprecated and the options will be made mutually exclusive after 2022-06-01.
-

aliases: aws_security_token, access_token
+
Aliases aws_session_token and session_token have been added in version 3.2.0.
+

aliases: aws_session_token, session_token, aws_security_token, access_token
Shell pattern-style file matching.
-
Used after include to remove files (for instance, skip "*.txt")
+
Used after include to remove files (for instance, skip "*.txt")
For multiple patterns, comma-separate them.
Shell pattern-style file matching.
-
Used before exclude to determine eligible files (for instance, only "*.gif")
+
Used before exclude to determine eligible files (for instance, only "*.gif")
For multiple patterns, comma-separate them.