|
1 | | -# IAM role for External Secrets Operator to read from Secrets Manager |
2 | | -resource "aws_iam_role" "external_secrets" { |
3 | | - name = "workshops-external-secrets" |
| 1 | +# External Secrets policy |
| 2 | +data "aws_iam_policy_document" "workshops_external_secrets" { |
| 3 | + statement { |
| 4 | + effect = "Allow" |
| 5 | + actions = [ |
| 6 | + "secretsmanager:GetSecretValue", |
| 7 | + "secretsmanager:DescribeSecret" |
| 8 | + ] |
| 9 | + resources = [ |
| 10 | + "arn:aws:secretsmanager:sa-east-1:${data.aws_caller_identity.current.account_id}:secret:/workshops/*", |
| 11 | + "arn:aws:secretsmanager:sa-east-1:${data.aws_caller_identity.current.account_id}:secret:workshops/*" |
| 12 | + ] |
| 13 | + } |
| 14 | +} |
| 15 | + |
| 16 | +resource "aws_iam_policy" "workshops_external_secrets" { |
| 17 | + name = "workshops-external-secrets-policy" |
| 18 | + description = "IAM policy for External Secrets to read workshops secrets" |
| 19 | + policy = data.aws_iam_policy_document.workshops_external_secrets.json |
| 20 | +} |
| 21 | + |
| 22 | +# IAM role for External Secrets Operator |
| 23 | +resource "aws_iam_role" "workshops_external_secrets" { |
| 24 | + name = "workshops-external-secrets" |
| 25 | + description = "IAM role for External Secrets Operator in workshops namespace" |
4 | 26 |
|
5 | 27 | assume_role_policy = jsonencode({ |
6 | 28 | Version = "2012-10-17" |
7 | | - Statement = [ |
8 | | - { |
9 | | - Effect = "Allow" |
10 | | - Principal = { |
11 | | - Federated = "arn:aws:iam::${var.aws_account_id}:oidc-provider/${local.oidc_provider}" |
12 | | - } |
13 | | - Action = "sts:AssumeRoleWithWebIdentity" |
14 | | - Condition = { |
15 | | - StringEquals = { |
16 | | - "${local.oidc_provider}:sub" = "system:serviceaccount:${var.namespace}:external-secrets" |
17 | | - "${local.oidc_provider}:aud" = "sts.amazonaws.com" |
18 | | - } |
| 29 | + Statement = [{ |
| 30 | + Effect = "Allow" |
| 31 | + Principal = { |
| 32 | + Federated = data.terraform_remote_state.eks.outputs.oidc_provider_arn |
| 33 | + } |
| 34 | + Action = "sts:AssumeRoleWithWebIdentity" |
| 35 | + Condition = { |
| 36 | + StringEquals = { |
| 37 | + "${replace(data.terraform_remote_state.eks.outputs.oidc_provider_arn, "/^(.*provider/)/", "")}:sub" = "system:serviceaccount:${var.namespace}:external-secrets" |
| 38 | + "${replace(data.terraform_remote_state.eks.outputs.oidc_provider_arn, "/^(.*provider/)/", "")}:aud" = "sts.amazonaws.com" |
19 | 39 | } |
20 | 40 | } |
21 | | - ] |
| 41 | + }] |
22 | 42 | }) |
23 | | -} |
24 | 43 |
|
25 | | -resource "aws_iam_role_policy" "external_secrets" { |
26 | | - name = "secrets-access" |
27 | | - role = aws_iam_role.external_secrets.id |
| 44 | + tags = { |
| 45 | + Name = "workshops-external-secrets" |
| 46 | + } |
| 47 | +} |
28 | 48 |
|
29 | | - policy = jsonencode({ |
30 | | - Version = "2012-10-17" |
31 | | - Statement = [ |
32 | | - { |
33 | | - Effect = "Allow" |
34 | | - Action = [ |
35 | | - "secretsmanager:GetSecretValue", |
36 | | - "secretsmanager:DescribeSecret" |
37 | | - ] |
38 | | - Resource = "arn:aws:secretsmanager:${var.aws_region}:${var.aws_account_id}:secret:/workshops/*" |
39 | | - } |
40 | | - ] |
41 | | - }) |
| 49 | +resource "aws_iam_role_policy_attachment" "workshops_external_secrets" { |
| 50 | + role = aws_iam_role.workshops_external_secrets.name |
| 51 | + policy_arn = aws_iam_policy.workshops_external_secrets.arn |
42 | 52 | } |
0 commit comments