route53 module is not able to authenticathe using IAM role #41185
Labels
affects_2.4
This issue/PR affects Ansible v2.4
aws
bot_closed
cloud
collection:community.aws
collection
Related to Ansible Collections work
feature
This issue/PR relates to a feature request.
module
This issue/PR relates to a module.
needs_collection_redirect
https://github.com/ansible/ansibullbot/blob/master/docs/collection_migration.md
support:community
This issue/PR relates to code supported by the Ansible community.
traceback
This issue/PR includes a traceback.
SUMMARY
This module should be ported to boto3 to allow authentication with IAM roles.
When running a playbook that employs Route53 module on an EC2 intance that authenticate itself with AWS services using IAM role (IAM Role associated to an EC2 instance), the playbook task fails to authenticate (Boto3).
The general idea is that, if I explicit
the task in the playbook works perfectly.
Respect to documentation if I remove this part the module should rely on existing environment variable or better on existing Boto3 authentication.
Boto 3 supports authentication via IAM role but route53 seems to refuse it.
Moreover other tasks in the playbook employing AWS services (e.g. launching EC2 instances) do work smootly with this kind of (boto3) authentication method.
ISSUE TYPE
COMPONENT NAME
route53
ANSIBLE VERSION
CONFIGURATION
OS / ENVIRONMENT
ansible 2.4.1.0
Linux Alpine 10
Python 2.7
Running Toward
AWS EC2 service
STEPS TO REPRODUCE
EXPECTED RESULTS
ACTUAL RESULTS
The text was updated successfully, but these errors were encountered: