Dre4m Shell
Server IP : 85.214.239.14  /  Your IP : 18.118.144.244
Web Server : Apache/2.4.62 (Debian)
System : Linux h2886529.stratoserver.net 4.9.0 #1 SMP Tue Jan 9 19:45:01 MSK 2024 x86_64
User : www-data ( 33)
PHP Version : 7.4.18
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare,
MySQL : OFF  |  cURL : OFF  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : OFF
Directory :  /lib/python3/dist-packages/ansible_collections/amazon/aws/plugins/doc_fragments/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME SHELL ]     

Current File : /lib/python3/dist-packages/ansible_collections/amazon/aws/plugins/doc_fragments/aws.py
# -*- coding: utf-8 -*-

# Copyright: (c) 2014, Will Thames <will@thames.id.au>
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)

from __future__ import (absolute_import, division, print_function)
__metaclass__ = type


class ModuleDocFragment(object):

    # AWS only documentation fragment
    DOCUMENTATION = r'''
options:
  access_key:
    description:
      - AWS access key ID.
      - See the AWS documentation for more information about access tokens
        U(https://docs.aws.amazon.com/general/latest/gr/aws-sec-cred-types.html#access-keys-and-secret-access-keys).
      - The C(AWS_ACCESS_KEY_ID), C(AWS_ACCESS_KEY) or C(EC2_ACCESS_KEY)
        environment variables may also be used in decreasing order of
        preference.  Prior to release 6.0.0 these environment variables will be
        ignored if the I(profile) parameter is passed.  After release 6.0.0
        I(access_key) will always fall back to the environment variables if set.
      - The I(aws_access_key) and I(profile) options are mutually exclusive.
      - The I(aws_access_key_id) alias was added in release 5.1.0 for
        consistency with the AWS botocore SDK.
      - The I(ec2_access_key) alias has been deprecated and will be removed in a
        release after 2024-12-01.
      - Support for the C(EC2_ACCESS_KEY) environment variable has been
        deprecated and will be removed in a release after 2024-12-01.
    type: str
    aliases: ['aws_access_key_id', 'aws_access_key', 'ec2_access_key']
  secret_key:
    description:
      - AWS secret access key.
      - See the AWS documentation for more information about access tokens
        U(https://docs.aws.amazon.com/general/latest/gr/aws-sec-cred-types.html#access-keys-and-secret-access-keys).
      - The C(AWS_SECRET_ACCESS_KEY), C(AWS_SECRET_KEY), or C(EC2_SECRET_KEY)
        environment variables may also be used in decreasing order of
        preference.  Prior to release 6.0.0 these environment variables will be
        ignored if the I(profile) parameter is passed.  After release 6.0.0
        I(secret_key) will always fall back to the environment variables if set.
      - The I(secret_key) and I(profile) options are mutually exclusive.
      - The I(aws_secret_access_key) alias was added in release 5.1.0 for
        consistency with the AWS botocore SDK.
      - The I(ec2_secret_key) alias has been deprecated and will be removed in a
        release after 2024-12-01.
      - Support for the C(EC2_SECRET_KEY) environment variable has been
        deprecated and will be removed in a release after 2024-12-01.
    type: str
    aliases: ['aws_secret_access_key', 'aws_secret_key', 'ec2_secret_key']
  session_token:
    description:
      - AWS STS session token for use with temporary credentials.
      - See the AWS documentation for more information about access tokens
        U(https://docs.aws.amazon.com/general/latest/gr/aws-sec-cred-types.html#access-keys-and-secret-access-keys).
      - The C(AWS_SESSION_TOKEN), C(AWS_SECURITY_TOKEN) or C(EC2_SECURITY_TOKEN)
        environment variables may also be used in decreasing order of preference.
        Prior to release 6.0.0 these environment variables will be
        ignored if the I(profile) parameter is passed.  After release 6.0.0
        I(session_token) will always fall back to the environment variables if set.
      - The I(security_token) and I(profile) options are mutually exclusive.
      - Aliases I(aws_session_token) and I(session_token) were added in release
        3.2.0, with the parameter being renamed from I(security_token) to
        I(session_token) in release 6.0.0.
      - The I(security_token), I(aws_security_token), and I(access_token)
        aliases have been deprecated and will be removed in a release after
        2024-12-01.
      - Support for the C(EC2_SECRET_KEY) and C(AWS_SECURITY_TOKEN) environment
        variables has been deprecated and will be removed in a release after
        2024-12-01.
    type: str
    aliases: ['aws_session_token', 'security_token', 'aws_security_token', 'access_token']
  profile:
    description:
      - A named AWS profile to use for authentication.
      - See the AWS documentation for more information about named profiles
        U(https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-profiles.html).
      - The C(AWS_PROFILE) environment variable may also be used.  Prior to release 6.0.0 the
        C(AWS_PROFILE) environment variable will be ignored if any of I(access_key), I(secret_key),
        or I(session_token) are passed.  After release 6.0.0 I(profile) will always fall back to the
        C(AWS_PROFILE) environment variable if set.
      - The I(profile) option is mutually exclusive with the I(aws_access_key),
        I(aws_secret_key) and I(security_token) options.
    type: str
    aliases: ['aws_profile']

  endpoint_url:
    description:
      - URL to connect to instead of the default AWS endpoints.  While this
        can be used to connection to other AWS-compatible services the
        amazon.aws and community.aws collections are only tested against
        AWS.
      - The  C(AWS_URL) or C(EC2_URL) environment variables may also be used,
        in decreasing order of preference.
      - The I(ec2_url) and I(s3_url) aliases have been deprecated and will be
        removed in a release after 2024-12-01.
      - Support for the C(EC2_URL) environment variable has been deprecated and
        will be removed in a release after 2024-12-01.
    type: str
    aliases: ['ec2_url', 'aws_endpoint_url', 's3_url' ]
  aws_ca_bundle:
    description:
      - The location of a CA Bundle to use when validating SSL certificates.
      - The C(AWS_CA_BUNDLE) environment variable may also be used.
    type: path
  validate_certs:
    description:
      - When set to C(false), SSL certificates will not be validated for
        communication with the AWS APIs.
      - Setting I(validate_certs=false) is strongly discouraged, as an
        alternative, consider setting I(aws_ca_bundle) instead.
    type: bool
    default: true
  aws_config:
    description:
      - A dictionary to modify the botocore configuration.
      - Parameters can be found in the AWS documentation
        U(https://botocore.amazonaws.com/v1/documentation/api/latest/reference/config.html#botocore.config.Config).
    type: dict
  debug_botocore_endpoint_logs:
    description:
      - Use a C(botocore.endpoint) logger to parse the unique (rather than total)
        C("resource:action") API calls made during a task, outputing the set to
        the resource_actions key in the task results. Use the
        C(aws_resource_action) callback to output to total list made during
        a playbook.
      - The C(ANSIBLE_DEBUG_BOTOCORE_LOGS) environment variable may also be used.
    type: bool
    default: false
notes:
  - B(Caution:) For modules, environment variables and configuration files are
    read from the Ansible 'host' context and not the 'controller' context.
    As such, files may need to be explicitly copied to the 'host'.  For lookup
    and connection plugins, environment variables and configuration files are
    read from the Ansible 'controller' context and not the 'host' context.
  - The AWS SDK (boto3) that Ansible uses may also read defaults for credentials
    and other settings, such as the region, from its configuration files in the
    Ansible 'host' context (typically C(~/.aws/credentials)).
    See U(https://boto3.amazonaws.com/v1/documentation/api/latest/guide/credentials.html)
    for more information.
'''

Anon7 - 2022
AnonSec Team