mirror of
https://github.com/ansible-collections/community.general.git
synced 2025-04-26 20:31:27 -07:00
* elb_application_lb: fix dangerous default of deleting an ELB if state is omitted by changing state to default to present to be more like other AWS modules
574 lines
21 KiB
Python
574 lines
21 KiB
Python
#!/usr/bin/python
|
|
# This file is part of Ansible
|
|
#
|
|
# Ansible is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# Ansible is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
ANSIBLE_METADATA = {'metadata_version': '1.1',
|
|
'status': ['preview'],
|
|
'supported_by': 'community'}
|
|
|
|
DOCUMENTATION = '''
|
|
---
|
|
module: elb_application_lb
|
|
short_description: Manage an Application load balancer
|
|
description:
|
|
- Manage an AWS Application Elastic Load Balancer. See U(https://aws.amazon.com/blogs/aws/new-aws-application-load-balancer/) for details.
|
|
version_added: "2.4"
|
|
requirements: [ boto3 ]
|
|
author: "Rob White (@wimnat)"
|
|
options:
|
|
access_logs_enabled:
|
|
description:
|
|
- "Whether or not to enable access logs. When true, I(access_logs_s3_bucket) must be set."
|
|
required: false
|
|
type: bool
|
|
access_logs_s3_bucket:
|
|
description:
|
|
- The name of the S3 bucket for the access logs. This attribute is required if access logs in Amazon S3 are enabled. The bucket must exist in the same
|
|
region as the load balancer and have a bucket policy that grants Elastic Load Balancing permission to write to the bucket.
|
|
required: false
|
|
access_logs_s3_prefix:
|
|
description:
|
|
- The prefix for the location in the S3 bucket. If you don't specify a prefix, the access logs are stored in the root of the bucket.
|
|
required: false
|
|
deletion_protection:
|
|
description:
|
|
- Indicates whether deletion protection for the ELB is enabled.
|
|
required: false
|
|
default: no
|
|
type: bool
|
|
http2:
|
|
description:
|
|
- Indicates whether to enable HTTP2 routing.
|
|
required: false
|
|
default: no
|
|
type: bool
|
|
version_added: 2.6
|
|
idle_timeout:
|
|
description:
|
|
- The number of seconds to wait before an idle connection is closed.
|
|
required: false
|
|
default: 60
|
|
listeners:
|
|
description:
|
|
- A list of dicts containing listeners to attach to the ELB. See examples for detail of the dict required. Note that listener keys
|
|
are CamelCased.
|
|
required: false
|
|
name:
|
|
description:
|
|
- The name of the load balancer. This name must be unique within your AWS account, can have a maximum of 32 characters, must contain only alphanumeric
|
|
characters or hyphens, and must not begin or end with a hyphen.
|
|
required: true
|
|
purge_listeners:
|
|
description:
|
|
- If yes, existing listeners will be purged from the ELB to match exactly what is defined by I(listeners) parameter. If the I(listeners) parameter is
|
|
not set then listeners will not be modified
|
|
default: yes
|
|
type: bool
|
|
purge_tags:
|
|
description:
|
|
- If yes, existing tags will be purged from the resource to match exactly what is defined by I(tags) parameter. If the I(tags) parameter is not set then
|
|
tags will not be modified.
|
|
required: false
|
|
default: yes
|
|
type: bool
|
|
subnets:
|
|
description:
|
|
- A list of the IDs of the subnets to attach to the load balancer. You can specify only one subnet per Availability Zone. You must specify subnets from
|
|
at least two Availability Zones. Required if state=present.
|
|
required: false
|
|
security_groups:
|
|
description:
|
|
- A list of the names or IDs of the security groups to assign to the load balancer. Required if state=present.
|
|
required: false
|
|
default: []
|
|
scheme:
|
|
description:
|
|
- Internet-facing or internal load balancer. An ELB scheme can not be modified after creation.
|
|
required: false
|
|
default: internet-facing
|
|
choices: [ 'internet-facing', 'internal' ]
|
|
state:
|
|
description:
|
|
- Create or destroy the load balancer.
|
|
default: present
|
|
choices: [ 'present', 'absent' ]
|
|
tags:
|
|
description:
|
|
- A dictionary of one or more tags to assign to the load balancer.
|
|
required: false
|
|
wait:
|
|
description:
|
|
- Wait for the load balancer to have a state of 'active' before completing. A status check is
|
|
performed every 15 seconds until a successful state is reached. An error is returned after 40 failed checks.
|
|
default: no
|
|
type: bool
|
|
version_added: 2.6
|
|
wait_timeout:
|
|
description:
|
|
- The time in seconds to use in conjunction with I(wait).
|
|
version_added: 2.6
|
|
purge_rules:
|
|
description:
|
|
- When set to no, keep the existing load balancer rules in place. Will modify and add, but will not delete.
|
|
default: yes
|
|
type: bool
|
|
version_added: 2.7
|
|
extends_documentation_fragment:
|
|
- aws
|
|
- ec2
|
|
notes:
|
|
- Listeners are matched based on port. If a listener's port is changed then a new listener will be created.
|
|
- Listener rules are matched based on priority. If a rule's priority is changed then a new rule will be created.
|
|
'''
|
|
|
|
EXAMPLES = '''
|
|
# Note: These examples do not set authentication details, see the AWS Guide for details.
|
|
|
|
# Create an ELB and attach a listener
|
|
- elb_application_lb:
|
|
name: myelb
|
|
security_groups:
|
|
- sg-12345678
|
|
- my-sec-group
|
|
subnets:
|
|
- subnet-012345678
|
|
- subnet-abcdef000
|
|
listeners:
|
|
- Protocol: HTTP # Required. The protocol for connections from clients to the load balancer (HTTP or HTTPS) (case-sensitive).
|
|
Port: 80 # Required. The port on which the load balancer is listening.
|
|
# The security policy that defines which ciphers and protocols are supported. The default is the current predefined security policy.
|
|
SslPolicy: ELBSecurityPolicy-2015-05
|
|
Certificates: # The ARN of the certificate (only one certficate ARN should be provided)
|
|
- CertificateArn: arn:aws:iam::12345678987:server-certificate/test.domain.com
|
|
DefaultActions:
|
|
- Type: forward # Required. Only 'forward' is accepted at this time
|
|
TargetGroupName: # Required. The name of the target group
|
|
state: present
|
|
|
|
# Create an ELB and attach a listener with logging enabled
|
|
- elb_application_lb:
|
|
access_logs_enabled: yes
|
|
access_logs_s3_bucket: mybucket
|
|
access_logs_s3_prefix: "/logs"
|
|
name: myelb
|
|
security_groups:
|
|
- sg-12345678
|
|
- my-sec-group
|
|
subnets:
|
|
- subnet-012345678
|
|
- subnet-abcdef000
|
|
listeners:
|
|
- Protocol: HTTP # Required. The protocol for connections from clients to the load balancer (HTTP or HTTPS) (case-sensitive).
|
|
Port: 80 # Required. The port on which the load balancer is listening.
|
|
# The security policy that defines which ciphers and protocols are supported. The default is the current predefined security policy.
|
|
SslPolicy: ELBSecurityPolicy-2015-05
|
|
Certificates: # The ARN of the certificate (only one certficate ARN should be provided)
|
|
- CertificateArn: arn:aws:iam::12345678987:server-certificate/test.domain.com
|
|
DefaultActions:
|
|
- Type: forward # Required. Only 'forward' is accepted at this time
|
|
TargetGroupName: # Required. The name of the target group
|
|
state: present
|
|
|
|
# Create an ALB with listeners and rules
|
|
- elb_application_lb:
|
|
name: test-alb
|
|
subnets:
|
|
- subnet-12345678
|
|
- subnet-87654321
|
|
security_groups:
|
|
- sg-12345678
|
|
scheme: internal
|
|
listeners:
|
|
- Protocol: HTTPS
|
|
Port: 443
|
|
DefaultActions:
|
|
- Type: forward
|
|
TargetGroupName: test-target-group
|
|
Certificates:
|
|
- CertificateArn: arn:aws:iam::12345678987:server-certificate/test.domain.com
|
|
SslPolicy: ELBSecurityPolicy-2015-05
|
|
Rules:
|
|
- Conditions:
|
|
- Field: path-pattern
|
|
Values:
|
|
- '/test'
|
|
Priority: '1'
|
|
Actions:
|
|
- TargetGroupName: test-target-group
|
|
Type: forward
|
|
state: present
|
|
|
|
# Remove an ELB
|
|
- elb_application_lb:
|
|
name: myelb
|
|
state: absent
|
|
|
|
'''
|
|
|
|
RETURN = '''
|
|
access_logs_s3_bucket:
|
|
description: The name of the S3 bucket for the access logs.
|
|
returned: when state is present
|
|
type: string
|
|
sample: mys3bucket
|
|
access_logs_s3_enabled:
|
|
description: Indicates whether access logs stored in Amazon S3 are enabled.
|
|
returned: when state is present
|
|
type: string
|
|
sample: true
|
|
access_logs_s3_prefix:
|
|
description: The prefix for the location in the S3 bucket.
|
|
returned: when state is present
|
|
type: string
|
|
sample: /my/logs
|
|
availability_zones:
|
|
description: The Availability Zones for the load balancer.
|
|
returned: when state is present
|
|
type: list
|
|
sample: "[{'subnet_id': 'subnet-aabbccddff', 'zone_name': 'ap-southeast-2a'}]"
|
|
canonical_hosted_zone_id:
|
|
description: The ID of the Amazon Route 53 hosted zone associated with the load balancer.
|
|
returned: when state is present
|
|
type: string
|
|
sample: ABCDEF12345678
|
|
created_time:
|
|
description: The date and time the load balancer was created.
|
|
returned: when state is present
|
|
type: string
|
|
sample: "2015-02-12T02:14:02+00:00"
|
|
deletion_protection_enabled:
|
|
description: Indicates whether deletion protection is enabled.
|
|
returned: when state is present
|
|
type: string
|
|
sample: true
|
|
dns_name:
|
|
description: The public DNS name of the load balancer.
|
|
returned: when state is present
|
|
type: string
|
|
sample: internal-my-elb-123456789.ap-southeast-2.elb.amazonaws.com
|
|
idle_timeout_timeout_seconds:
|
|
description: The idle timeout value, in seconds.
|
|
returned: when state is present
|
|
type: string
|
|
sample: 60
|
|
ip_address_type:
|
|
description: The type of IP addresses used by the subnets for the load balancer.
|
|
returned: when state is present
|
|
type: string
|
|
sample: ipv4
|
|
listeners:
|
|
description: Information about the listeners.
|
|
returned: when state is present
|
|
type: complex
|
|
contains:
|
|
listener_arn:
|
|
description: The Amazon Resource Name (ARN) of the listener.
|
|
returned: when state is present
|
|
type: string
|
|
sample: ""
|
|
load_balancer_arn:
|
|
description: The Amazon Resource Name (ARN) of the load balancer.
|
|
returned: when state is present
|
|
type: string
|
|
sample: ""
|
|
port:
|
|
description: The port on which the load balancer is listening.
|
|
returned: when state is present
|
|
type: int
|
|
sample: 80
|
|
protocol:
|
|
description: The protocol for connections from clients to the load balancer.
|
|
returned: when state is present
|
|
type: string
|
|
sample: HTTPS
|
|
certificates:
|
|
description: The SSL server certificate.
|
|
returned: when state is present
|
|
type: complex
|
|
contains:
|
|
certificate_arn:
|
|
description: The Amazon Resource Name (ARN) of the certificate.
|
|
returned: when state is present
|
|
type: string
|
|
sample: ""
|
|
ssl_policy:
|
|
description: The security policy that defines which ciphers and protocols are supported.
|
|
returned: when state is present
|
|
type: string
|
|
sample: ""
|
|
default_actions:
|
|
description: The default actions for the listener.
|
|
returned: when state is present
|
|
type: string
|
|
contains:
|
|
type:
|
|
description: The type of action.
|
|
returned: when state is present
|
|
type: string
|
|
sample: ""
|
|
target_group_arn:
|
|
description: The Amazon Resource Name (ARN) of the target group.
|
|
returned: when state is present
|
|
type: string
|
|
sample: ""
|
|
load_balancer_arn:
|
|
description: The Amazon Resource Name (ARN) of the load balancer.
|
|
returned: when state is present
|
|
type: string
|
|
sample: arn:aws:elasticloadbalancing:ap-southeast-2:0123456789:loadbalancer/app/my-elb/001122334455
|
|
load_balancer_name:
|
|
description: The name of the load balancer.
|
|
returned: when state is present
|
|
type: string
|
|
sample: my-elb
|
|
routing_http2_enabled:
|
|
description: Indicates whether HTTP/2 is enabled.
|
|
returned: when state is present
|
|
type: string
|
|
sample: true
|
|
scheme:
|
|
description: Internet-facing or internal load balancer.
|
|
returned: when state is present
|
|
type: string
|
|
sample: internal
|
|
security_groups:
|
|
description: The IDs of the security groups for the load balancer.
|
|
returned: when state is present
|
|
type: list
|
|
sample: ['sg-0011223344']
|
|
state:
|
|
description: The state of the load balancer.
|
|
returned: when state is present
|
|
type: dict
|
|
sample: "{'code': 'active'}"
|
|
tags:
|
|
description: The tags attached to the load balancer.
|
|
returned: when state is present
|
|
type: dict
|
|
sample: "{
|
|
'Tag': 'Example'
|
|
}"
|
|
type:
|
|
description: The type of load balancer.
|
|
returned: when state is present
|
|
type: string
|
|
sample: application
|
|
vpc_id:
|
|
description: The ID of the VPC for the load balancer.
|
|
returned: when state is present
|
|
type: string
|
|
sample: vpc-0011223344
|
|
'''
|
|
|
|
from ansible.module_utils.aws.core import AnsibleAWSModule
|
|
from ansible.module_utils.ec2 import boto3_conn, get_aws_connection_info, camel_dict_to_snake_dict, ec2_argument_spec, \
|
|
boto3_tag_list_to_ansible_dict, compare_aws_tags, HAS_BOTO3
|
|
|
|
from ansible.module_utils.aws.elbv2 import ApplicationLoadBalancer, ELBListeners, ELBListener, ELBListenerRules, ELBListenerRule
|
|
from ansible.module_utils.aws.elb_utils import get_elb_listener_rules
|
|
|
|
|
|
def create_or_update_elb(elb_obj):
|
|
"""Create ELB or modify main attributes. json_exit here"""
|
|
|
|
if elb_obj.elb:
|
|
# ELB exists so check subnets, security groups and tags match what has been passed
|
|
|
|
# Subnets
|
|
if not elb_obj.compare_subnets():
|
|
elb_obj.modify_subnets()
|
|
|
|
# Security Groups
|
|
if not elb_obj.compare_security_groups():
|
|
elb_obj.modify_security_groups()
|
|
|
|
# Tags - only need to play with tags if tags parameter has been set to something
|
|
if elb_obj.tags is not None:
|
|
|
|
# Delete necessary tags
|
|
tags_need_modify, tags_to_delete = compare_aws_tags(boto3_tag_list_to_ansible_dict(elb_obj.elb['tags']),
|
|
boto3_tag_list_to_ansible_dict(elb_obj.tags), elb_obj.purge_tags)
|
|
if tags_to_delete:
|
|
elb_obj.delete_tags(tags_to_delete)
|
|
|
|
# Add/update tags
|
|
if tags_need_modify:
|
|
elb_obj.modify_tags()
|
|
|
|
else:
|
|
# Create load balancer
|
|
elb_obj.create_elb()
|
|
|
|
# ELB attributes
|
|
elb_obj.update_elb_attributes()
|
|
elb_obj.modify_elb_attributes()
|
|
|
|
# Listeners
|
|
listeners_obj = ELBListeners(elb_obj.connection, elb_obj.module, elb_obj.elb['LoadBalancerArn'])
|
|
|
|
listeners_to_add, listeners_to_modify, listeners_to_delete = listeners_obj.compare_listeners()
|
|
|
|
# Delete listeners
|
|
for listener_to_delete in listeners_to_delete:
|
|
listener_obj = ELBListener(elb_obj.connection, elb_obj.module, listener_to_delete, elb_obj.elb['LoadBalancerArn'])
|
|
listener_obj.delete()
|
|
listeners_obj.changed = True
|
|
|
|
# Add listeners
|
|
for listener_to_add in listeners_to_add:
|
|
listener_obj = ELBListener(elb_obj.connection, elb_obj.module, listener_to_add, elb_obj.elb['LoadBalancerArn'])
|
|
listener_obj.add()
|
|
listeners_obj.changed = True
|
|
|
|
# Modify listeners
|
|
for listener_to_modify in listeners_to_modify:
|
|
listener_obj = ELBListener(elb_obj.connection, elb_obj.module, listener_to_modify, elb_obj.elb['LoadBalancerArn'])
|
|
listener_obj.modify()
|
|
listeners_obj.changed = True
|
|
|
|
# If listeners changed, mark ELB as changed
|
|
if listeners_obj.changed:
|
|
elb_obj.changed = True
|
|
|
|
# Rules of each listener
|
|
for listener in listeners_obj.listeners:
|
|
if 'Rules' in listener:
|
|
rules_obj = ELBListenerRules(elb_obj.connection, elb_obj.module, elb_obj.elb['LoadBalancerArn'], listener['Rules'], listener['Port'])
|
|
|
|
rules_to_add, rules_to_modify, rules_to_delete = rules_obj.compare_rules()
|
|
|
|
# Delete rules
|
|
if elb_obj.module.params['purge_rules']:
|
|
for rule in rules_to_delete:
|
|
rule_obj = ELBListenerRule(elb_obj.connection, elb_obj.module, {'RuleArn': rule}, rules_obj.listener_arn)
|
|
rule_obj.delete()
|
|
elb_obj.changed = True
|
|
|
|
# Add rules
|
|
for rule in rules_to_add:
|
|
rule_obj = ELBListenerRule(elb_obj.connection, elb_obj.module, rule, rules_obj.listener_arn)
|
|
rule_obj.create()
|
|
elb_obj.changed = True
|
|
|
|
# Modify rules
|
|
for rule in rules_to_modify:
|
|
rule_obj = ELBListenerRule(elb_obj.connection, elb_obj.module, rule, rules_obj.listener_arn)
|
|
rule_obj.modify()
|
|
elb_obj.changed = True
|
|
|
|
# Get the ELB again
|
|
elb_obj.update()
|
|
|
|
# Get the ELB listeners again
|
|
listeners_obj.update()
|
|
|
|
# Update the ELB attributes
|
|
elb_obj.update_elb_attributes()
|
|
|
|
# Convert to snake_case and merge in everything we want to return to the user
|
|
snaked_elb = camel_dict_to_snake_dict(elb_obj.elb)
|
|
snaked_elb.update(camel_dict_to_snake_dict(elb_obj.elb_attributes))
|
|
snaked_elb['listeners'] = []
|
|
for listener in listeners_obj.current_listeners:
|
|
# For each listener, get listener rules
|
|
listener['rules'] = get_elb_listener_rules(elb_obj.connection, elb_obj.module, listener['ListenerArn'])
|
|
snaked_elb['listeners'].append(camel_dict_to_snake_dict(listener))
|
|
|
|
# Change tags to ansible friendly dict
|
|
snaked_elb['tags'] = boto3_tag_list_to_ansible_dict(snaked_elb['tags'])
|
|
|
|
elb_obj.module.exit_json(changed=elb_obj.changed, **snaked_elb)
|
|
|
|
|
|
def delete_elb(elb_obj):
|
|
|
|
if elb_obj.elb:
|
|
elb_obj.delete()
|
|
|
|
elb_obj.module.exit_json(changed=elb_obj.changed)
|
|
|
|
|
|
def main():
|
|
|
|
argument_spec = ec2_argument_spec()
|
|
argument_spec.update(
|
|
dict(
|
|
access_logs_enabled=dict(type='bool'),
|
|
access_logs_s3_bucket=dict(type='str'),
|
|
access_logs_s3_prefix=dict(type='str'),
|
|
deletion_protection=dict(type='bool'),
|
|
http2=dict(type='bool'),
|
|
idle_timeout=dict(type='int'),
|
|
listeners=dict(type='list',
|
|
elements='dict',
|
|
options=dict(
|
|
Protocol=dict(type='str', required=True),
|
|
Port=dict(type='int', required=True),
|
|
SslPolicy=dict(type='str'),
|
|
Certificates=dict(type='list'),
|
|
DefaultActions=dict(type='list', required=True),
|
|
Rules=dict(type='list')
|
|
)
|
|
),
|
|
name=dict(required=True, type='str'),
|
|
purge_listeners=dict(default=True, type='bool'),
|
|
purge_tags=dict(default=True, type='bool'),
|
|
subnets=dict(type='list'),
|
|
security_groups=dict(type='list'),
|
|
scheme=dict(default='internet-facing', choices=['internet-facing', 'internal']),
|
|
state=dict(choices=['present', 'absent'], default='present'),
|
|
tags=dict(type='dict'),
|
|
wait_timeout=dict(type='int'),
|
|
wait=dict(default=False, type='bool'),
|
|
purge_rules=dict(default=True, type='bool')
|
|
)
|
|
)
|
|
|
|
module = AnsibleAWSModule(argument_spec=argument_spec,
|
|
required_if=[
|
|
('state', 'present', ['subnets', 'security_groups'])
|
|
],
|
|
required_together=[
|
|
['access_logs_enabled', 'access_logs_s3_bucket', 'access_logs_s3_prefix']
|
|
]
|
|
)
|
|
|
|
# Quick check of listeners parameters
|
|
listeners = module.params.get("listeners")
|
|
if listeners is not None:
|
|
for listener in listeners:
|
|
for key in listener.keys():
|
|
if key == 'Protocol' and listener[key] == 'HTTPS':
|
|
if listener.get('SslPolicy') is None:
|
|
module.fail_json(msg="'SslPolicy' is a required listener dict key when Protocol = HTTPS")
|
|
|
|
if listener.get('Certificates') is None:
|
|
module.fail_json(msg="'Certificates' is a required listener dict key when Protocol = HTTPS")
|
|
|
|
connection = module.client('elbv2')
|
|
connection_ec2 = module.client('ec2')
|
|
|
|
state = module.params.get("state")
|
|
|
|
elb = ApplicationLoadBalancer(connection, connection_ec2, module)
|
|
|
|
if state == 'present':
|
|
create_or_update_elb(elb)
|
|
else:
|
|
delete_elb(elb)
|
|
|
|
|
|
if __name__ == '__main__':
|
|
main()
|