-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #43 from bcgov/dev
Push to production
- Loading branch information
Showing
11 changed files
with
48 additions
and
41 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -6,11 +6,11 @@ The following sections describe the requirements for building your application o | |
|
||
## Prerequisites | ||
|
||
1. Create a [provisioning request for a project set](provision-a-project-set.md) for your team on the B.C. Government Public Cloud | ||
1. Create a [provisioning request for a project set](get-started/provision-a-project-set.md) for your team on the B.C. Government Public Cloud | ||
|
||
2. Once approved, your project set will be provisioned followed up by an email sent to the Product Owner and Technical Lead once the provisioning is complete | ||
|
||
3. Request access for the reset of the team by submitting a request to <[email protected]>. Refer to the guidelines on what details to include in your request for [account access](provision-a-project-set.md#account-access) | ||
3. Request access for the reset of the team by submitting a request to <[email protected]>. Refer to the guidelines on what details to include in your request for [account access](get-started/provision-a-project-set.md#account-access) | ||
|
||
## Limitations of the AWS Landing Zone | ||
|
||
|
@@ -26,12 +26,12 @@ Take the following into consideration when building your application on the AWS | |
|
||
* Most networking is under the management of AWS Landing Zone and is not subject to change. Security groups are the exception to this rule | ||
|
||
* IAM Users and their access keys can only be generated by the [IAM User management service](iam-user-service.md), which is created and managed by the Public Cloud team | ||
* IAM Users and their access keys can only be generated by the [IAM User management service](design-build-and-deploy-an-application/iam-user-service.md), which is created and managed by the Public Cloud team | ||
|
||
|
||
## Other requirements and best practices | ||
|
||
To use GitHub Actions for deploying your application, [OpenID Connect (OIDC) authentication](deploy-an-app-to-the-aws-landing-zone.md#configuring-github-action-oidc-authentication-to-aws) is required. | ||
To use GitHub Actions for deploying your application, [OpenID Connect (OIDC) authentication](design-build-and-deploy-an-application/deploy-an-app-to-the-aws-landing-zone.md#configuring-github-action-oidc-authentication-to-aws) is required. | ||
|
||
To deploy your application: | ||
|
||
|
@@ -108,11 +108,11 @@ This combined approach of Terraform AWS CLI and VSCode streamlines the deploymen | |
|
||
## Next steps | ||
|
||
- [Deploy an application to the B.C. Government AWS Landing Zone](deploy-an-app-to-the-aws-landing-zone.md) | ||
- [Deploy an application to the B.C. Government AWS Landing Zone](design-build-and-deploy-an-application/deploy-an-app-to-the-aws-landing-zone.md) | ||
|
||
## Related pages | ||
|
||
- [Provision a project set](provision-a-project-set.md) | ||
- [Account access](provision-a-project-set.md#account-access) | ||
- [Configuring GitHub Action OIDC Authentication to AWS](deploy-an-app-to-the-aws-landing-zone.md#configuring-github-action-oidc-authentication-to-aws) | ||
- [Deploy an application to the B.C. Government AWS Landing Zone](deploy-an-app-to-the-aws-landing-zone.md) | ||
- [Provision a project set](get-started/provision-a-project-set.md) | ||
- [Account access](get-started/provision-a-project-set.md#account-access) | ||
- [Configuring GitHub Action OIDC Authentication to AWS](design-build-and-deploy-an-application/deploy-an-app-to-the-aws-landing-zone.md#configuring-github-action-oidc-authentication-to-aws) | ||
- [Deploy an application to the B.C. Government AWS Landing Zone](design-build-and-deploy-an-application/deploy-an-app-to-the-aws-landing-zone.md) |
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,7 +1,7 @@ | ||
# Provision a new AWS project set | ||
Last updated: **November 21, 2023** | ||
|
||
On the Public Cloud platform, different teams organize their work on isolated [project sets](deploy-an-app-to-the-aws-landing-zone.md#aws-accounts-in-your-project-set). Before working on the platform, the [Product Owner](bc-govs-aws-landing-zone-overview.md#key-features-of-the-product-registry-service) of the respective team must submit a project set provisioning request for your team on the B.C. Government Public Cloud. | ||
On the Public Cloud platform, different teams organize their work on isolated [project sets](design-build-and-deploy-an-application/deploy-an-app-to-the-aws-landing-zone.md#aws-accounts-in-your-project-set). Before working on the platform, the [Product Owner](get-started/bc-govs-aws-landing-zone-overview.md#key-features-of-the-product-registry-service) of the respective team must submit a project set provisioning request for your team on the B.C. Government Public Cloud. | ||
|
||
--- | ||
|
||
|
@@ -47,12 +47,12 @@ To do that you must meet the prerequisites for provisioning a project set outlin | |
|
||
![ministry-provider](images/provision-a-project-set/ministry-provider.png) | ||
|
||
6. Enter the [Product Owner](bc-govs-aws-landing-zone-overview.md#key-features-of-the-product-registry-service) and [Technical Lead(s)](bc-govs-aws-landing-zone-overview.md#key-features-of-the-product-registry-service) **details** per each required field. | ||
6. Enter the [Product Owner](get-started/bc-govs-aws-landing-zone-overview.md#key-features-of-the-product-registry-service) and [Technical Lead(s)](get-started/bc-govs-aws-landing-zone-overview.md#key-features-of-the-product-registry-service) **details** per each required field. | ||
|
||
<!-- TODO: move some of this to a separate "RBAC", or "Login Application" document and link to it here --> | ||
|
||
- The Product Owner and Technical Lead(s) will be granted access to the 4 AWS accounts in the [Project Set](deploy-an-app-to-the-aws-landing-zone.md#aws-accounts-in-your-project-set) via the Admin role | ||
- The Admin role is attached to the AWS managed policy [AdministratorAccess](https://docs.aws.amazon.com/aws-managed-policy/latest/reference/AdministratorAccess.html) which provides unrestricted access into AWS accounts. However, because we are operating under the ASEA's [guardrails](bc-govs-aws-landing-zone-overview.md#security-guardrails) the Admin role is restricted within those bounds in all accounts in the ASEA. As long as the user with an Admin role is not breaching the guardrails, they will be unrestricted within the account. | ||
- The Product Owner and Technical Lead(s) will be granted access to the 4 AWS accounts in the [Project Set](design-build-and-deploy-an-application/deploy-an-app-to-the-aws-landing-zone.md#aws-accounts-in-your-project-set) via the Admin role | ||
- The Admin role is attached to the AWS managed policy [AdministratorAccess](https://docs.aws.amazon.com/aws-managed-policy/latest/reference/AdministratorAccess.html) which provides unrestricted access into AWS accounts. However, because we are operating under the ASEA's [guardrails](get-started/bc-govs-aws-landing-zone-overview.md#security-guardrails) the Admin role is restricted within those bounds in all accounts in the ASEA. As long as the user with an Admin role is not breaching the guardrails, they will be unrestricted within the account. | ||
|
||
![po-tech-lead](images/provision-a-project-set/po-tech-leads.png) | ||
|
||
|
@@ -76,7 +76,7 @@ To do that you must meet the prerequisites for provisioning a project set outlin | |
|
||
## Account access | ||
<!-- TODO: move some of this to a separate "RBAC", or "Login Application" document and link to it here --> | ||
Once the AWS accounts have been provisioned, the [Product Owner](bc-govs-aws-landing-zone-overview.md#key-features-of-the-product-registry-service) and [Technical Lead(s)](bc-govs-aws-landing-zone-overview.md#key-features-of-the-product-registry-service) will be able to see them all in the [Login Application](https://login.nimbus.cloud.gov.bc.ca/) and they will have Admin access into the accounts. | ||
Once the AWS accounts have been provisioned, the [Product Owner](get-started/bc-govs-aws-landing-zone-overview.md#key-features-of-the-product-registry-service) and [Technical Lead(s)](get-started/bc-govs-aws-landing-zone-overview.md#key-features-of-the-product-registry-service) will be able to see them all in the [Login Application](https://login.nimbus.cloud.gov.bc.ca/) and they will have Admin access into the accounts. | ||
|
||
For other team members access, please have the Product Owner email: [email protected] with the following information: | ||
|
||
|
@@ -90,5 +90,5 @@ For other team members access, please have the Product Owner email: cloud.pathfi | |
## Related pages | ||
- [Platform Project Registry](https://registry.developer.gov.bc.ca/login) | ||
- [OnBoarding Guide for BC Gov AWS ASEA](https://digital.gov.bc.ca/cloud/services/public/onboard/) | ||
- [B.C. Government AWS Landing Zone overview](bc-govs-aws-landing-zone-overview.md) | ||
- [Deploy an application to the B.C. Government AWS Landing Zone](deploy-an-app-to-the-aws-landing-zone.md) | ||
- [B.C. Government AWS Landing Zone overview](get-started/bc-govs-aws-landing-zone-overview.md) | ||
- [Deploy an application to the B.C. Government AWS Landing Zone](design-build-and-deploy-an-application/deploy-an-app-to-the-aws-landing-zone.md) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters