Skip to content

Commit 3ed16ca

Browse files
committed
create policy an role for secrets manager access from EKS
1 parent a5d4f19 commit 3ed16ca

File tree

1 file changed

+2
-5
lines changed

1 file changed

+2
-5
lines changed

core-env/aws/main.tf

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -109,10 +109,8 @@ resource "aws_iam_role_policy_attachment" "gha_attachment" {
109109
# Secrets Manager for ESO
110110
#
111111

112-
113-
# Specific role for GHA via OIDC to assume (can also be assumed by team)
114112
resource "aws_iam_policy" "demo_secrets_policy" {
115-
name = var.priviledged_assumed_role
113+
name = "sedemo-secrets-access-from-eks"
116114
description = "Policy to grant demo cluster access to secrets via ESO"
117115

118116
policy = templatefile(
@@ -128,9 +126,8 @@ resource "aws_iam_policy" "demo_secrets_policy" {
128126
}
129127
}
130128

131-
# Specific role for GHA via OIDC to assume (can also be assumed by team)
132129
resource "aws_iam_role" "secrets_role" {
133-
name = var.priviledged_assumed_role
130+
name = "sedemo-secrets-access-from-eks"
134131
description = "Role grants access to secrets policy for ESO"
135132

136133
assume_role_policy = templatefile(

0 commit comments

Comments
 (0)