-
Notifications
You must be signed in to change notification settings - Fork 9
/
Copy pathaws_secgroup_ids_from_names.py
43 lines (36 loc) · 1.47 KB
/
aws_secgroup_ids_from_names.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
# (c) 2017, Jon Hadfield <[email protected]>
"""
Description: This lookup takes an AWS region and a list of one or more
security Group Names and returns a list of matching security Group IDs.
Example Usage:
{{ lookup('aws_secgroup_ids_from_names', ('eu-west-1', ['nginx_group', 'mysql_group'])) }}
"""
from __future__ import (absolute_import, division, print_function)
__metaclass__ = type
from ansible.errors import *
from ansible.plugins.lookup import LookupBase
try:
import boto3
import botocore
except ImportError:
raise AnsibleError("aws_secgroup_ids_from_names lookup cannot be run without boto installed")
class LookupModule(LookupBase):
def run(self, terms, variables=None, **kwargs):
region = terms[0][0]
group_names = terms[0][1]
if isinstance(group_names, basestring):
group_names = [group_names]
session = boto3.session.Session(region_name=region)
try:
ec2_client = session.client('ec2')
except botocore.exceptions.NoRegionError:
raise AnsibleError("AWS region not specified.")
# for group_name in group_names:
secgroup_filter = [{'Name': 'group-name', 'Values': group_names}]
result = ec2_client.describe_security_groups(Filters=secgroup_filter)
groups = result.get('SecurityGroups')
group_ids = []
if groups:
for group in groups:
group_ids.append(group.get('GroupId').encode('utf-8'))
return group_ids