Skip to content

Commit

Permalink
testing
Browse files Browse the repository at this point in the history
  • Loading branch information
ben851 committed Sep 4, 2024
1 parent 0ab50c2 commit f8239f5
Show file tree
Hide file tree
Showing 2 changed files with 27 additions and 3 deletions.
28 changes: 26 additions & 2 deletions scripts/aws-auth.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -8,9 +8,33 @@ data:
- groups:
- system:bootstrappers
- system:nodes
rolearn: arn:aws:iam::$ACCOUNT_ID:role/eks-worker-role
rolearn: arn:aws:iam::800095993820:role/eks-worker-role
username: system:node:{{EC2PrivateDNSName}}
- groups:
- system:masters
rolearn: arn:aws:iam::$ACCOUNT_ID:role/$ROLE_NAME
rolearn: arn:aws:iam::800095993820:role/AWSReservedSSO_AWSAdministratorAccess_e6e62a284c3c35fc
username: AWSAdministratorAccess:{{SessionName}}
- rolearn: arn:aws:iam::800095993820:role/notification-admin-apply
username: notification-admin-apply
groups:
- system:masters
- rolearn: arn:aws:iam::800095993820:role/notification-api-apply
username: notification-api-apply
groups:
- system:masters
- rolearn: arn:aws:iam::800095993820:role/notification-document-download-api-apply
username: notification-document-download-api-apply
groups:
- system:masters
- rolearn: arn:aws:iam::800095993820:role/notification-documentation-apply
username: notification-documentation-apply
groups:
- system:masters
- rolearn: arn:aws:iam::800095993820:role/notification-manifests-apply
username: notification-manifests-apply
groups:
- system:masters
- rolearn: arn:aws:iam::800095993820:role/ipv4-geolocate-webservice-apply
username: ipv4-geolocate-webservice-apply
groups:
- system:masters
2 changes: 1 addition & 1 deletion scripts/kubernetesAWSAuthFix.sh
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
#!/bin/bash
# This script updates the aws-auth config map in the newly created EKS cluster since AWS EKS doesn't create it properly when going through Github Actions
export ROLE_NAME=$(aws iam list-roles | jq -r '.Roles[] | select(.RoleName|match("AWSReservedSSO_AWSAdministratorAccess_*")) | .RoleName')
#export ROLE_NAME=$(aws iam list-roles | jq -r '.Roles[] | select(.RoleName|match("AWSReservedSSO_AWSAdministratorAccess_*")) | .RoleName')
export ACCOUNT_ID=$(aws sts get-caller-identity --query Account --output text)

envsubst < aws-auth.yaml | sponge aws-auth.yaml
Expand Down

0 comments on commit f8239f5

Please sign in to comment.