-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Simplify setup and teardown of staging infrastructure #103
Comments
Lets start with |
Blocked at Move personal account to organization. Next Steps :
|
Managed to delete personal IAM Identity Center and recreate with AWS Organizations. Successfully added admin user with AdministratorAccess permissions. |
Setup update
|
Login to expired session (due to timeout)
|
Task: Create an IAM account programatically with suitable policy to read/write to this bucket Before creating user - enable automatic sending of verification email via IAM Identity Center console
Create S3 policy
TODO:
Edit: Updated with instruction link for enabling automatic sending of verification email when creating user |
Create permission set and assign to group
|
Now you can verify the user via email and set a password and add the user for AWS CLI access |
In Progress - IAM Identity Center (SSO) and Github Actions to upload to S3 |
Update:
Steps to follow to configure Github Actions access to AWS Official AWS credentials github action - https://github.com/aws-actions/configure-aws-credentials
Create roles for OIDC - https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_oidc.html
Example steps - https://www.eliasbrange.dev/posts/secure-aws-deploys-from-github-actions-with-oidc/ TODO
Sample role trust policy document - https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_oidc.html#idp_oidc_Create_GitHub
Create inline permission policy - https://awscli.amazonaws.com/v2/documentation/api/latest/reference/iam/put-role-policy.html
Sample role permissions policy - https://docs.aws.amazon.com/AmazonS3/latest/userguide/example-policies-s3.html#iam-policy-ex2
|
Successfully setup github workflow to push objects to AWS S3. Refer sample workflow here |
Validating the S3 bucket role policy
|
Denny's notes from Aurora's callCreate accounts/identities which have temporary credentials that get revoked every hour (default) AWS has 3 products for identity management
Convention Root user HAS to create an admin account or restricted user via IAM iDentity center.
users created via IdP, aws CLI setup two types of policies Github Environments when using environment, url in the github policy will be different. there is a cli to validate policies. Generate the github OIDC token and added it to IAM role Process
in create role step inline policy vs managed policy AWS_ROLE_TO_ASSUME is the role ARN |
Note: Permissions Approach 1: Role-Based Access Control (RBAC)
Approach 2: Attribute-Based Access Control (ABAC)
ABAC in IAM Identity Center
TODO |
@duggalsu ok so this makes sense. Lets finalize a convention around Attributes to create some policies. This also means that in all of out automations and scripts we'll have to make sure we add tags to resources. |
Scope of Work
script to start and stop a staging environment
take a backup and restore aws rds postgres
put secrets somewhere and checkin all other files
kubectl comands to bring up and down deployment
The text was updated successfully, but these errors were encountered: