From 3955fdef17a1e3d69c53c9147157678905408ec7 Mon Sep 17 00:00:00 2001 From: Dmitry Kireev Date: Thu, 6 Jun 2024 14:33:20 +0000 Subject: [PATCH] WIP --- .github/workflows/run.e2e-tests.yml | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/.github/workflows/run.e2e-tests.yml b/.github/workflows/run.e2e-tests.yml index 23da0cf..f8ac4da 100644 --- a/.github/workflows/run.e2e-tests.yml +++ b/.github/workflows/run.e2e-tests.yml @@ -111,21 +111,21 @@ jobs: # Reset state (if any) curl --insecure -v --request POST http://127.0.0.1:4566/_localstack/state/reset - ### Terraform State Setup - # Create R53 domain + echo "Terraform State Setup" + echo "Create R53 domain" aws route53 create-hosted-zone --name "${NAMESPACE}.local" --caller-reference "2014-04-01-18:47" - # Create S3 state bucket + echo "Create S3 state bucket" aws s3api create-bucket --bucket "${NAMESPACE}-000000000000-tf-state" - # Create DynamoDB Table + echo "Create DynamoDB Table" aws dynamodb create-table \ --table-name tf-state-lock \ --attribute-definitions AttributeName=LockID,AttributeType=S \ --key-schema AttributeName=LockID,KeyType=HASH \ --billing-mode PAY_PER_REQUEST - # Create IAM Roles for non-root access + echo "Create IAM Roles for non-root access aws iam create-role \ --role-name eks-admin \ --assume-role-policy-document '{ @@ -151,9 +151,9 @@ jobs: ] }' - "" - # Configure User for non-root access + + echo "Configure User for non-root access" aws iam create-user --user-name badger aws iam create-access-key --user-name badger | jq -r '.AccessKey | "[default]\naws_access_key_id=\(.AccessKeyId)\naws_secret_access_key=\(.SecretAccessKey)\nregion = us-east-1"' >> ~/.aws/credentials aws iam attach-user-policy --policy-arn arn:aws:iam::aws:policy/AdministratorAccess --user-name badger