Skip to content

Commit a5d4f19

Browse files
committed
create policy an role for secrets manager access from EKS
1 parent 86f8894 commit a5d4f19

File tree

3 files changed

+47
-0
lines changed

3 files changed

+47
-0
lines changed

core-env/aws/outputs.tf

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
output "demo_operator_role_arn" {
2+
value = aws_iam_role.demo_role.arn
3+
}
4+
output "demo_pipeline_role_arn" {
5+
value = aws_iam_role.demo_gha_role.arn
6+
}
Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
{
2+
"Version": "2012-10-17",
3+
"Statement": [
4+
{
5+
"Action" : [
6+
"secretsmanager:ListSecrets",
7+
"secretsmanager:BatchGetSecretValue"
8+
],
9+
"Effect" : "Allow",
10+
"Resource" : "*"
11+
},
12+
{
13+
"Effect": "Allow",
14+
"Action": [
15+
"secretsmanager:GetResourcePolicy",
16+
"secretsmanager:GetSecretValue",
17+
"secretsmanager:DescribeSecret",
18+
"secretsmanager:ListSecretVersionIds"
19+
],
20+
"Resource": [
21+
"arn:aws:secretsmanager:us-west-2:${AWS_ACCOUNT_ID}:secret:kargo-*"
22+
]
23+
}
24+
]
25+
}
Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
{
2+
"Version": "2012-10-17",
3+
"Statement": [
4+
{
5+
"Sid": "AllowEksAuthToAssumeRoleForPodIdentity",
6+
"Effect": "Allow",
7+
"Principal": {
8+
"Service": "pods.eks.amazonaws.com"
9+
},
10+
"Action": [
11+
"sts:AssumeRole",
12+
"sts:TagSession"
13+
]
14+
}
15+
]
16+
}

0 commit comments

Comments
 (0)