summaryrefslogtreecommitdiffstats
path: root/roles/openshift_aws/tasks/uninstall_security_group.yml
diff options
context:
space:
mode:
authorJoel Diaz <jdiaz@redhat.com>2017-12-20 01:22:23 +0000
committerJoel Diaz <jdiaz@redhat.com>2018-01-22 16:38:12 +0000
commita0015f7ead6a89dbb602bc245b51e82cfad66902 (patch)
tree663ad43e1d81b2a3b6b5a41914184edeeabc28de /roles/openshift_aws/tasks/uninstall_security_group.yml
parentc933a61030a882e3d33834390e82a9e196e0f654 (diff)
downloadopenshift-a0015f7ead6a89dbb602bc245b51e82cfad66902.tar.gz
openshift-a0015f7ead6a89dbb602bc245b51e82cfad66902.tar.bz2
openshift-a0015f7ead6a89dbb602bc245b51e82cfad66902.tar.xz
openshift-a0015f7ead6a89dbb602bc245b51e82cfad66902.zip
allow uninstalling AWS objects created by prerequisite playbook
add deprovisioners/uninstallers for objects created via playbooks/aws/openshift-cluster/prerequisites.yml specifically: security groups, vpcs, and any ssh keys introduce openshift_aws_enable_uninstall_shared_objects to protect AWS objects that would be shared in the case of multiple clusters co-existing in one AWS account. right now it protects the ssh keys, but it can/should be used to protect against deleting the shared IAM instance profile as well. default this variable to False to be on the safe side when uninstalling/deprovisioning. add some documentation on using deprovisioning playbooks
Diffstat (limited to 'roles/openshift_aws/tasks/uninstall_security_group.yml')
-rw-r--r--roles/openshift_aws/tasks/uninstall_security_group.yml14
1 files changed, 14 insertions, 0 deletions
diff --git a/roles/openshift_aws/tasks/uninstall_security_group.yml b/roles/openshift_aws/tasks/uninstall_security_group.yml
new file mode 100644
index 000000000..55d40e8ec
--- /dev/null
+++ b/roles/openshift_aws/tasks/uninstall_security_group.yml
@@ -0,0 +1,14 @@
+---
+- name: delete the node group sgs
+ oo_ec2_group:
+ state: absent
+ name: "{{ item.value.name}}"
+ region: "{{ openshift_aws_region }}"
+ with_dict: "{{ openshift_aws_node_security_groups }}"
+
+- name: delete the k8s sgs for the node group
+ oo_ec2_group:
+ state: absent
+ name: "{{ item.value.name }}_k8s"
+ region: "{{ openshift_aws_region }}"
+ with_dict: "{{ openshift_aws_node_security_groups }}"