Commit 6fd8fbb5 authored by Chris Merrett's avatar Chris Merrett

Added group role assumption permissions and attached

parent 5692bf8d
Pipeline #4982 passed with stage
in 16 seconds
...@@ -65,3 +65,13 @@ resource "aws_iam_role" "admin" { ...@@ -65,3 +65,13 @@ resource "aws_iam_role" "admin" {
resource "aws_iam_group" "admin" { resource "aws_iam_group" "admin" {
name = "${var.cluster_name}-eks-kubernetes-admin" name = "${var.cluster_name}-eks-kubernetes-admin"
} }
resource "aws_iam_policy" "admin_assumerole" {
name = "${var.cluster_name}-eks-kubernetes-admin-assumerole"
policy = "${data.aws_iam_policy_document.admin_assumerole.json}"
}
resource "aws_iam_group_policy_attachment" "admin_assumerole" {
group = "${aws_iam_group.admin.name}"
policy_arn = "${aws_iam_policy.admin_assumerole.arn}"
}
...@@ -55,13 +55,19 @@ data "aws_iam_policy_document" "admin" { ...@@ -55,13 +55,19 @@ data "aws_iam_policy_document" "admin" {
identifiers = [ identifiers = [
"arn:aws:iam::${data.aws_caller_identity.current.account_id}:root", "arn:aws:iam::${data.aws_caller_identity.current.account_id}:root",
"arn:aws:iam::${data.aws_caller_identity.current.account_id}:group/${var.cluster_name}-eks-kubernetes-admin",
"arn:aws:iam::${data.aws_caller_identity.current.account_id}:role/Steamhaus",
] ]
} }
} }
} }
data "aws_iam_policy_document" "admin_assumerole" {
statement {
effect = "Allow"
actions = ["sts:AssumeRole"]
resources = ["arn:aws:iam::${data.aws_caller_identity.current.account_id}:role/${var.cluster_name}-eks-kubernetes-admin"]
}
}
data "template_file" "kubeconfig" { data "template_file" "kubeconfig" {
template = "${file("${path.module}/templates/kubeconfig.tpl")}" template = "${file("${path.module}/templates/kubeconfig.tpl")}"
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment