diff --git a/roles/_meta/aws_region/meta/main.yml b/roles/_meta/aws_region/meta/main.yml index a11491c0e..0c13ab2e9 100644 --- a/roles/_meta/aws_region/meta/main.yml +++ b/roles/_meta/aws_region/meta/main.yml @@ -8,4 +8,4 @@ dependencies: - role: aws/aws_cloudwatch_log_group - role: aws/aws_backup - role: aws/aws_backup_sns - - role: aws/aws_admin_tools +# - role: aws/aws_admin_tools diff --git a/roles/aws/aws_backup_validation/tasks/main.yml b/roles/aws/aws_backup_validation/tasks/main.yml index 37366f4b2..08b5f17e6 100644 --- a/roles/aws/aws_backup_validation/tasks/main.yml +++ b/roles/aws/aws_backup_validation/tasks/main.yml @@ -34,21 +34,21 @@ # ansible.builtin.set_fact: # aws_lambda: "{{ aws_lambda | ansible.utils.remove_keys(target=['response_metadata', 'function_file']) }}" -- name: Create an IAM Managed Policy for passing roles and setup IAM role. - ansible.builtin.include_role: - name: aws/aws_iam_role - vars: - aws_iam_role: - name: AWSBackupDefaultServiceRole - aws_profile: "{{ _aws_profile }}" - inline_policies: - name: "PassRole" - resource: "*" - action: "iam:PassRole" - policy_document: "{{ lookup('file', 'pass_role_backup.j2') }}" - managed_policies: - - arn:aws:iam::aws:policy/service-role/AWSBackupServiceRolePolicyForBackup - - arn:aws:iam::aws:policy/service-role/AWSBackupServiceRolePolicyForRestores +#- name: Create an IAM Managed Policy for passing roles and setup IAM role. +# ansible.builtin.include_role: +# name: aws/aws_iam_role +# vars: +# aws_iam_role: +# name: AWSBackupDefaultServiceRole +# aws_profile: "{{ _aws_profile }}" +# inline_policies: +# name: "PassRole" +# resource: "*" +# action: "iam:PassRole" +# policy_document: "{{ lookup('file', 'pass_role_backup.j2') }}" +# managed_policies: +# - arn:aws:iam::aws:policy/service-role/AWSBackupServiceRolePolicyForBackup +# - arn:aws:iam::aws:policy/service-role/AWSBackupServiceRolePolicyForRestores # TODO: Not all clients have verified identity #- name: Get verified domain.