mirror of
https://github.com/Telecominfraproject/wlan-toolsmith.git
synced 2025-11-02 11:58:09 +00:00
[TOOLS-137] Add: helm values for wlan-onboard and AWS user with access to EKS
This commit is contained in:
27
helm-values/aws-wlan-onboard.yaml
Normal file
27
helm-values/aws-wlan-onboard.yaml
Normal file
@@ -0,0 +1,27 @@
|
|||||||
|
images:
|
||||||
|
onboard:
|
||||||
|
repository: tip-tip-wlan-test-bss-docker-repo.jfrog.io/wlan-onboard
|
||||||
|
tag: latest
|
||||||
|
pullPolicy: IfNotPresent
|
||||||
|
regcred: eyJhdXRocyI6IHsidGlwLXRpcC13bGFuLWNsb3VkLWRvY2tlci1yZXBvLmpmcm9nLmlvIjogeyJhdXRoIjogImRHbHdMWEpsWVdRNmRHbHdMWEpsWVdRPSJ9fX0=
|
||||||
|
|
||||||
|
services:
|
||||||
|
onboard:
|
||||||
|
type: NodePort
|
||||||
|
|
||||||
|
ingresses:
|
||||||
|
default:
|
||||||
|
annotations:
|
||||||
|
kubernetes.io/ingress.class: alb
|
||||||
|
alb.ingress.kubernetes.io/scheme: internet-facing
|
||||||
|
alb.ingress.kubernetes.io/group.name: test-bss-load-testing
|
||||||
|
alb.ingress.kubernetes.io/certificate-arn: arn:aws:acm:us-east-2:289708231103:certificate/bfa89c7a-5b64-4a8a-bcfe-ffec655b5285
|
||||||
|
alb.ingress.kubernetes.io/listen-ports: '[{"HTTP": 80}, {"HTTPS": 443}]'
|
||||||
|
alb.ingress.kubernetes.io/actions.ssl-redirect: '{"Type": "redirect", "RedirectConfig": { "Protocol": "HTTPS", "Port": "443", "StatusCode": "HTTP_302"}}'
|
||||||
|
external-dns.alpha.kubernetes.io/hostname: onboard.cicd.lab.wlan.tip.build
|
||||||
|
hosts:
|
||||||
|
- onboard.cicd.lab.wlan.tip.build
|
||||||
|
paths:
|
||||||
|
- path: /*
|
||||||
|
serviceName: onboard
|
||||||
|
servicePort: http
|
||||||
@@ -126,6 +126,11 @@ locals {
|
|||||||
userarn = aws_iam_user.quali-poc.arn
|
userarn = aws_iam_user.quali-poc.arn
|
||||||
username = aws_iam_user.quali-poc.name
|
username = aws_iam_user.quali-poc.name
|
||||||
groups = ["system:masters"]
|
groups = ["system:masters"]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
userarn = aws_iam_user.gh-actions-wlan-test-bss.arn
|
||||||
|
username = aws_iam_user.gh-actions-wlan-test-bss.name
|
||||||
|
groups = ["system:masters"]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
admin_roles = [for role in var.eks_admin_roles : {
|
admin_roles = [for role in var.eks_admin_roles : {
|
||||||
|
|||||||
@@ -35,6 +35,7 @@ data "aws_iam_policy_document" "kms" {
|
|||||||
identifiers = [
|
identifiers = [
|
||||||
"arn:aws:iam::${data.aws_caller_identity.current.account_id}:role/aws-reserved/sso.amazonaws.com/AWSReservedSSO_AdministratorAccess_5b24211378e8344f",
|
"arn:aws:iam::${data.aws_caller_identity.current.account_id}:role/aws-reserved/sso.amazonaws.com/AWSReservedSSO_AdministratorAccess_5b24211378e8344f",
|
||||||
"arn:aws:iam::${data.aws_caller_identity.current.account_id}:role/aws-reserved/sso.amazonaws.com/AWSReservedSSO_SystemAdministrator_622371b0ceece6f8",
|
"arn:aws:iam::${data.aws_caller_identity.current.account_id}:role/aws-reserved/sso.amazonaws.com/AWSReservedSSO_SystemAdministrator_622371b0ceece6f8",
|
||||||
|
"arn:aws:iam::${data.aws_caller_identity.current.account_id}:role/atlantis-ecs_task_execution",
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -55,6 +56,7 @@ data "aws_iam_policy_document" "kms" {
|
|||||||
identifiers = [
|
identifiers = [
|
||||||
"arn:aws:iam::${data.aws_caller_identity.current.account_id}:role/aws-reserved/sso.amazonaws.com/AWSReservedSSO_AdministratorAccess_5b24211378e8344f",
|
"arn:aws:iam::${data.aws_caller_identity.current.account_id}:role/aws-reserved/sso.amazonaws.com/AWSReservedSSO_AdministratorAccess_5b24211378e8344f",
|
||||||
"arn:aws:iam::${data.aws_caller_identity.current.account_id}:role/aws-reserved/sso.amazonaws.com/AWSReservedSSO_SystemAdministrator_622371b0ceece6f8",
|
"arn:aws:iam::${data.aws_caller_identity.current.account_id}:role/aws-reserved/sso.amazonaws.com/AWSReservedSSO_SystemAdministrator_622371b0ceece6f8",
|
||||||
|
"arn:aws:iam::${data.aws_caller_identity.current.account_id}:role/atlantis-ecs_task_execution",
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,3 +1,15 @@
|
|||||||
|
data "aws_iam_policy_document" "gh-actions-policy" {
|
||||||
|
statement {
|
||||||
|
effect = "Allow"
|
||||||
|
actions = [
|
||||||
|
"eks:DescribeCluster",
|
||||||
|
"eks:ListClusters",
|
||||||
|
]
|
||||||
|
resources = ["*"]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
# gh-actions-user
|
||||||
resource "aws_iam_user" "gh-actions-user" {
|
resource "aws_iam_user" "gh-actions-user" {
|
||||||
name = "gh-actions-user"
|
name = "gh-actions-user"
|
||||||
path = "/"
|
path = "/"
|
||||||
@@ -10,17 +22,7 @@ resource "aws_iam_user_policy" "lb_ro" {
|
|||||||
policy = data.aws_iam_policy_document.gh-actions-policy.json
|
policy = data.aws_iam_policy_document.gh-actions-policy.json
|
||||||
}
|
}
|
||||||
|
|
||||||
data "aws_iam_policy_document" "gh-actions-policy" {
|
# quali-poc
|
||||||
statement {
|
|
||||||
effect = "Allow"
|
|
||||||
actions = [
|
|
||||||
"eks:DescribeCluster",
|
|
||||||
"eks:ListClusters",
|
|
||||||
]
|
|
||||||
resources = ["*"]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
resource "aws_iam_user" "quali-poc" {
|
resource "aws_iam_user" "quali-poc" {
|
||||||
name = "quali-poc"
|
name = "quali-poc"
|
||||||
path = "/"
|
path = "/"
|
||||||
@@ -33,13 +35,15 @@ resource "aws_iam_user_policy" "lb_ro_quali" {
|
|||||||
policy = data.aws_iam_policy_document.gh-actions-policy.json
|
policy = data.aws_iam_policy_document.gh-actions-policy.json
|
||||||
}
|
}
|
||||||
|
|
||||||
data "aws_iam_policy_document" "quali-poc-policy" {
|
# gh-actions-wlan-test-bss
|
||||||
statement {
|
resource "aws_iam_user" "gh-actions-wlan-test-bss" {
|
||||||
effect = "Allow"
|
name = "gh-actions-wlan-test-bss"
|
||||||
actions = [
|
path = "/"
|
||||||
"eks:DescribeCluster",
|
tags = local.common_tags
|
||||||
"eks:ListClusters",
|
}
|
||||||
]
|
|
||||||
resources = ["*"]
|
resource "aws_iam_user_policy" "lb_ro_gh_wlan_test_bss" {
|
||||||
}
|
name = "eks-list-access"
|
||||||
|
user = aws_iam_user.gh-actions-wlan-test-bss.name
|
||||||
|
policy = data.aws_iam_policy_document.gh-actions-policy.json
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user