-
Notifications
You must be signed in to change notification settings - Fork 0
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks like we discussed.
|
I do not want to do this this way. The SSO auth part will vary, and we do not want the use of the specific permissionset as part of it. We need to stick with the TF formatted profile of {account_id}-{alias}. I want the entirety of the cluster build to use a role which is assumed, r-inf-terraform-eks. This role does not yet exist in every account, but it will through the use of a stackset. What we need to setup this role is the list of permissions for creating and administering the cluster and all the sub-components that it uses. Then, the provider would be something like "aws.eks" which is setup using an assume role profile to the r-inf-terraform-eks. This way, as the cluster is built, we will always have the builder available as this role, and it will simplify access to the k8s components. This is similar to the cluster admin roles. |
| default = [ | ||
| { | ||
| rolearn : "arn:aws-us-gov:iam::224384469011:role/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8" | ||
| aws_rolename : "" | ||
| username : "admin" | ||
| groups = ["system:masters"] | ||
| }, | ||
| { | ||
| rolearn : "arn:aws-us-gov:iam::224384469011:role/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa" | ||
| aws_rolename : "" | ||
| username : "admin" | ||
| groups = ["system:masters"] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do not hardcode role ARNs here, especially SSO roles. This is not at all portable.
This is also probably the time to look at the new authentication configuration options. Specifically, I believe we want to use |
We do need someone to research the needed permissions to apply to such a role. I had asked someone months ago, but nothing came out of it. |
|
AWS managed policies for Amazon Elastic Kubernetes Service Should we perhaps consider using these for the EKS Permissions boundary you describe?
My thought is to start with the Managed Policy as the default used for the r-inf-terraform-eks, then a customer admin can be granted the scoped admin role (or the defined admin role). This way we have the boundary permission represented by the r-inf-terraform-* for a given service. Thoughts? |
These policies are what is needed by the nodes to RUN EKS, not to provision the EKS necessarily. I do not intend for a customer to get the r-inf-terraform-eks role. They would be using the cluster admin role (also through an assume role). |
|
https://github.e.it.census.gov/terraform/252903981224-ma5-gov/pull/249 |
|
superseeded by #18 |
Adding cluster-admin-roles for inf-admin-t2 and inf-admin-t3.