Compare commits
No commits in common. "master" and "feature/privaterepo" have entirely different histories.
master
...
feature/pr
@ -3,7 +3,7 @@ Description: Nakama ECS Task
|
||||
Parameters:
|
||||
ServerName:
|
||||
Type: String
|
||||
Default: "main"
|
||||
Default: "nakama-default"
|
||||
NakamaContainer:
|
||||
Type: String
|
||||
Description: test
|
||||
@ -46,41 +46,9 @@ Parameters:
|
||||
Conditions:
|
||||
CreateSecret: !Equals [!Ref NakamaPasswordOverride, ""]
|
||||
NoRepositoryCredentials: !Equals [!Ref RepositoryCredentialsSecret, ""]
|
||||
RepositoryCredentials: !Not [!Equals [!Ref RepositoryCredentialsSecret, ""]]
|
||||
|
||||
Resources:
|
||||
|
||||
EcsExecutionerRole:
|
||||
Type: AWS::IAM::Role
|
||||
Properties:
|
||||
AssumeRolePolicyDocument:
|
||||
Version: '2012-10-17'
|
||||
Statement:
|
||||
- Effect: Allow
|
||||
Principal:
|
||||
Service:
|
||||
- ecs-tasks.amazonaws.com
|
||||
Action:
|
||||
- sts:AssumeRole
|
||||
ManagedPolicyArns:
|
||||
- arn:aws:iam::aws:policy/CloudWatchLogsFullAccess
|
||||
EcsExecutionPolicy:
|
||||
Condition: RepositoryCredentials
|
||||
Type: AWS::IAM::Policy
|
||||
Properties:
|
||||
PolicyName: AllowGettingSecrets
|
||||
Roles:
|
||||
- !Ref EcsExecutionerRole
|
||||
PolicyDocument:
|
||||
Statement:
|
||||
- Sid: ReadDockerSecret
|
||||
Action:
|
||||
- secretsmanager:Describe*
|
||||
- secretsmanager:Get*
|
||||
- secretsmanager:List*
|
||||
Effect: Allow
|
||||
Resource: !Ref RepositoryCredentialsSecret
|
||||
|
||||
AdminPortalPassword:
|
||||
Type: AWS::SecretsManager::Secret
|
||||
Condition: CreateSecret
|
||||
@ -100,7 +68,6 @@ Resources:
|
||||
TaskDefinition:
|
||||
Type: AWS::ECS::TaskDefinition
|
||||
Properties:
|
||||
ExecutionRoleArn: !Ref EcsExecutionerRole
|
||||
ContainerDefinitions:
|
||||
- !If
|
||||
- NoRepositoryCredentials
|
||||
|
Loading…
x
Reference in New Issue
Block a user