mirror of
https://github.com/Telecominfraproject/wlan-toolsmith.git
synced 2025-10-30 02:22:20 +00:00
[TOOLS-137] Add: helm values for wlan-onboard and AWS user with access to EKS
This commit is contained in:
27
helm-values/aws-wlan-onboard.yaml
Normal file
27
helm-values/aws-wlan-onboard.yaml
Normal file
@@ -0,0 +1,27 @@
|
||||
images:
|
||||
onboard:
|
||||
repository: tip-tip-wlan-test-bss-docker-repo.jfrog.io/wlan-onboard
|
||||
tag: latest
|
||||
pullPolicy: IfNotPresent
|
||||
regcred: eyJhdXRocyI6IHsidGlwLXRpcC13bGFuLWNsb3VkLWRvY2tlci1yZXBvLmpmcm9nLmlvIjogeyJhdXRoIjogImRHbHdMWEpsWVdRNmRHbHdMWEpsWVdRPSJ9fX0=
|
||||
|
||||
services:
|
||||
onboard:
|
||||
type: NodePort
|
||||
|
||||
ingresses:
|
||||
default:
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: alb
|
||||
alb.ingress.kubernetes.io/scheme: internet-facing
|
||||
alb.ingress.kubernetes.io/group.name: test-bss-load-testing
|
||||
alb.ingress.kubernetes.io/certificate-arn: arn:aws:acm:us-east-2:289708231103:certificate/bfa89c7a-5b64-4a8a-bcfe-ffec655b5285
|
||||
alb.ingress.kubernetes.io/listen-ports: '[{"HTTP": 80}, {"HTTPS": 443}]'
|
||||
alb.ingress.kubernetes.io/actions.ssl-redirect: '{"Type": "redirect", "RedirectConfig": { "Protocol": "HTTPS", "Port": "443", "StatusCode": "HTTP_302"}}'
|
||||
external-dns.alpha.kubernetes.io/hostname: onboard.cicd.lab.wlan.tip.build
|
||||
hosts:
|
||||
- onboard.cicd.lab.wlan.tip.build
|
||||
paths:
|
||||
- path: /*
|
||||
serviceName: onboard
|
||||
servicePort: http
|
||||
@@ -126,6 +126,11 @@ locals {
|
||||
userarn = aws_iam_user.quali-poc.arn
|
||||
username = aws_iam_user.quali-poc.name
|
||||
groups = ["system:masters"]
|
||||
},
|
||||
{
|
||||
userarn = aws_iam_user.gh-actions-wlan-test-bss.arn
|
||||
username = aws_iam_user.gh-actions-wlan-test-bss.name
|
||||
groups = ["system:masters"]
|
||||
}
|
||||
]
|
||||
admin_roles = [for role in var.eks_admin_roles : {
|
||||
|
||||
@@ -35,6 +35,7 @@ data "aws_iam_policy_document" "kms" {
|
||||
identifiers = [
|
||||
"arn:aws:iam::${data.aws_caller_identity.current.account_id}:role/aws-reserved/sso.amazonaws.com/AWSReservedSSO_AdministratorAccess_5b24211378e8344f",
|
||||
"arn:aws:iam::${data.aws_caller_identity.current.account_id}:role/aws-reserved/sso.amazonaws.com/AWSReservedSSO_SystemAdministrator_622371b0ceece6f8",
|
||||
"arn:aws:iam::${data.aws_caller_identity.current.account_id}:role/atlantis-ecs_task_execution",
|
||||
]
|
||||
}
|
||||
}
|
||||
@@ -55,6 +56,7 @@ data "aws_iam_policy_document" "kms" {
|
||||
identifiers = [
|
||||
"arn:aws:iam::${data.aws_caller_identity.current.account_id}:role/aws-reserved/sso.amazonaws.com/AWSReservedSSO_AdministratorAccess_5b24211378e8344f",
|
||||
"arn:aws:iam::${data.aws_caller_identity.current.account_id}:role/aws-reserved/sso.amazonaws.com/AWSReservedSSO_SystemAdministrator_622371b0ceece6f8",
|
||||
"arn:aws:iam::${data.aws_caller_identity.current.account_id}:role/atlantis-ecs_task_execution",
|
||||
]
|
||||
}
|
||||
}
|
||||
|
||||
@@ -1,3 +1,15 @@
|
||||
data "aws_iam_policy_document" "gh-actions-policy" {
|
||||
statement {
|
||||
effect = "Allow"
|
||||
actions = [
|
||||
"eks:DescribeCluster",
|
||||
"eks:ListClusters",
|
||||
]
|
||||
resources = ["*"]
|
||||
}
|
||||
}
|
||||
|
||||
# gh-actions-user
|
||||
resource "aws_iam_user" "gh-actions-user" {
|
||||
name = "gh-actions-user"
|
||||
path = "/"
|
||||
@@ -10,17 +22,7 @@ resource "aws_iam_user_policy" "lb_ro" {
|
||||
policy = data.aws_iam_policy_document.gh-actions-policy.json
|
||||
}
|
||||
|
||||
data "aws_iam_policy_document" "gh-actions-policy" {
|
||||
statement {
|
||||
effect = "Allow"
|
||||
actions = [
|
||||
"eks:DescribeCluster",
|
||||
"eks:ListClusters",
|
||||
]
|
||||
resources = ["*"]
|
||||
}
|
||||
}
|
||||
|
||||
# quali-poc
|
||||
resource "aws_iam_user" "quali-poc" {
|
||||
name = "quali-poc"
|
||||
path = "/"
|
||||
@@ -33,13 +35,15 @@ resource "aws_iam_user_policy" "lb_ro_quali" {
|
||||
policy = data.aws_iam_policy_document.gh-actions-policy.json
|
||||
}
|
||||
|
||||
data "aws_iam_policy_document" "quali-poc-policy" {
|
||||
statement {
|
||||
effect = "Allow"
|
||||
actions = [
|
||||
"eks:DescribeCluster",
|
||||
"eks:ListClusters",
|
||||
]
|
||||
resources = ["*"]
|
||||
}
|
||||
# gh-actions-wlan-test-bss
|
||||
resource "aws_iam_user" "gh-actions-wlan-test-bss" {
|
||||
name = "gh-actions-wlan-test-bss"
|
||||
path = "/"
|
||||
tags = local.common_tags
|
||||
}
|
||||
|
||||
resource "aws_iam_user_policy" "lb_ro_gh_wlan_test_bss" {
|
||||
name = "eks-list-access"
|
||||
user = aws_iam_user.gh-actions-wlan-test-bss.name
|
||||
policy = data.aws_iam_policy_document.gh-actions-policy.json
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user