mirror of
				https://github.com/Telecominfraproject/wlan-toolsmith.git
				synced 2025-10-31 02:47:51 +00:00 
			
		
		
		
	[TOOLS-137] Add: helm values for wlan-onboard and AWS user with access to EKS
This commit is contained in:
		
							
								
								
									
										27
									
								
								helm-values/aws-wlan-onboard.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										27
									
								
								helm-values/aws-wlan-onboard.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,27 @@ | ||||
| images: | ||||
|   onboard: | ||||
|     repository: tip-tip-wlan-test-bss-docker-repo.jfrog.io/wlan-onboard | ||||
|     tag: latest | ||||
|     pullPolicy: IfNotPresent | ||||
|     regcred: eyJhdXRocyI6IHsidGlwLXRpcC13bGFuLWNsb3VkLWRvY2tlci1yZXBvLmpmcm9nLmlvIjogeyJhdXRoIjogImRHbHdMWEpsWVdRNmRHbHdMWEpsWVdRPSJ9fX0= | ||||
|  | ||||
| services: | ||||
|   onboard: | ||||
|     type: NodePort | ||||
|  | ||||
| ingresses: | ||||
|   default:  | ||||
|     annotations: | ||||
|       kubernetes.io/ingress.class: alb | ||||
|       alb.ingress.kubernetes.io/scheme: internet-facing | ||||
|       alb.ingress.kubernetes.io/group.name: test-bss-load-testing | ||||
|       alb.ingress.kubernetes.io/certificate-arn: arn:aws:acm:us-east-2:289708231103:certificate/bfa89c7a-5b64-4a8a-bcfe-ffec655b5285 | ||||
|       alb.ingress.kubernetes.io/listen-ports: '[{"HTTP": 80}, {"HTTPS": 443}]' | ||||
|       alb.ingress.kubernetes.io/actions.ssl-redirect: '{"Type": "redirect", "RedirectConfig": { "Protocol": "HTTPS", "Port": "443", "StatusCode": "HTTP_302"}}' | ||||
|       external-dns.alpha.kubernetes.io/hostname: onboard.cicd.lab.wlan.tip.build | ||||
|     hosts: | ||||
|     - onboard.cicd.lab.wlan.tip.build | ||||
|     paths: | ||||
|     - path: /* | ||||
|       serviceName: onboard | ||||
|       servicePort: http | ||||
| @@ -126,6 +126,11 @@ locals { | ||||
|       userarn  = aws_iam_user.quali-poc.arn | ||||
|       username = aws_iam_user.quali-poc.name | ||||
|       groups   = ["system:masters"] | ||||
|     }, | ||||
|     { | ||||
|       userarn  = aws_iam_user.gh-actions-wlan-test-bss.arn | ||||
|       username = aws_iam_user.gh-actions-wlan-test-bss.name | ||||
|       groups   = ["system:masters"] | ||||
|     } | ||||
|   ] | ||||
|   admin_roles = [for role in var.eks_admin_roles : { | ||||
|   | ||||
| @@ -35,6 +35,7 @@ data "aws_iam_policy_document" "kms" { | ||||
|       identifiers = [ | ||||
|         "arn:aws:iam::${data.aws_caller_identity.current.account_id}:role/aws-reserved/sso.amazonaws.com/AWSReservedSSO_AdministratorAccess_5b24211378e8344f", | ||||
|         "arn:aws:iam::${data.aws_caller_identity.current.account_id}:role/aws-reserved/sso.amazonaws.com/AWSReservedSSO_SystemAdministrator_622371b0ceece6f8", | ||||
|         "arn:aws:iam::${data.aws_caller_identity.current.account_id}:role/atlantis-ecs_task_execution", | ||||
|       ] | ||||
|     } | ||||
|   } | ||||
| @@ -55,6 +56,7 @@ data "aws_iam_policy_document" "kms" { | ||||
|       identifiers = [ | ||||
|         "arn:aws:iam::${data.aws_caller_identity.current.account_id}:role/aws-reserved/sso.amazonaws.com/AWSReservedSSO_AdministratorAccess_5b24211378e8344f", | ||||
|         "arn:aws:iam::${data.aws_caller_identity.current.account_id}:role/aws-reserved/sso.amazonaws.com/AWSReservedSSO_SystemAdministrator_622371b0ceece6f8", | ||||
|         "arn:aws:iam::${data.aws_caller_identity.current.account_id}:role/atlantis-ecs_task_execution", | ||||
|       ] | ||||
|     } | ||||
|   } | ||||
|   | ||||
| @@ -1,3 +1,15 @@ | ||||
| data "aws_iam_policy_document" "gh-actions-policy" { | ||||
|   statement { | ||||
|     effect = "Allow" | ||||
|     actions = [ | ||||
|       "eks:DescribeCluster", | ||||
|       "eks:ListClusters", | ||||
|     ] | ||||
|     resources = ["*"] | ||||
|   } | ||||
| } | ||||
|  | ||||
| # gh-actions-user | ||||
| resource "aws_iam_user" "gh-actions-user" { | ||||
|   name = "gh-actions-user" | ||||
|   path = "/" | ||||
| @@ -10,17 +22,7 @@ resource "aws_iam_user_policy" "lb_ro" { | ||||
|   policy = data.aws_iam_policy_document.gh-actions-policy.json | ||||
| } | ||||
|  | ||||
| data "aws_iam_policy_document" "gh-actions-policy" { | ||||
|   statement { | ||||
|     effect = "Allow" | ||||
|     actions = [ | ||||
|       "eks:DescribeCluster", | ||||
|       "eks:ListClusters", | ||||
|     ] | ||||
|     resources = ["*"] | ||||
|   } | ||||
| } | ||||
|  | ||||
| # quali-poc | ||||
| resource "aws_iam_user" "quali-poc" { | ||||
|   name = "quali-poc" | ||||
|   path = "/" | ||||
| @@ -33,13 +35,15 @@ resource "aws_iam_user_policy" "lb_ro_quali" { | ||||
|   policy = data.aws_iam_policy_document.gh-actions-policy.json | ||||
| } | ||||
|  | ||||
| data "aws_iam_policy_document" "quali-poc-policy" { | ||||
|   statement { | ||||
|     effect = "Allow" | ||||
|     actions = [ | ||||
|       "eks:DescribeCluster", | ||||
|       "eks:ListClusters", | ||||
|     ] | ||||
|     resources = ["*"] | ||||
| # gh-actions-wlan-test-bss | ||||
| resource "aws_iam_user" "gh-actions-wlan-test-bss" { | ||||
|   name = "gh-actions-wlan-test-bss" | ||||
|   path = "/" | ||||
|   tags = local.common_tags | ||||
| } | ||||
|  | ||||
| resource "aws_iam_user_policy" "lb_ro_gh_wlan_test_bss" { | ||||
|   name   = "eks-list-access" | ||||
|   user   = aws_iam_user.gh-actions-wlan-test-bss.name | ||||
|   policy = data.aws_iam_policy_document.gh-actions-policy.json | ||||
| } | ||||
|   | ||||
		Reference in New Issue
	
	Block a user
	 Dmitry Dunaev
					Dmitry Dunaev