mirror of
				https://github.com/yeslayla/nakama-helm-chart.git
				synced 2025-10-31 10:03:03 +01:00 
			
		
		
		
	BUGFIX: Give ECS permission to grab private repo secret
This commit is contained in:
		| @ -46,9 +46,41 @@ Parameters: | |||||||
| Conditions: | Conditions: | ||||||
|   CreateSecret: !Equals [!Ref NakamaPasswordOverride, ""] |   CreateSecret: !Equals [!Ref NakamaPasswordOverride, ""] | ||||||
|   NoRepositoryCredentials: !Equals [!Ref RepositoryCredentialsSecret, ""] |   NoRepositoryCredentials: !Equals [!Ref RepositoryCredentialsSecret, ""] | ||||||
|  |   RepositoryCredentials: !Not [!Equals [!Ref RepositoryCredentialsSecret, ""]] | ||||||
|  |  | ||||||
| Resources: | Resources: | ||||||
|  |  | ||||||
|  |   EcsExecutionerRole: | ||||||
|  |     Type: AWS::IAM::Role | ||||||
|  |     Properties: | ||||||
|  |       AssumeRolePolicyDocument: | ||||||
|  |         Version: '2012-10-17' | ||||||
|  |         Statement: | ||||||
|  |         - Effect: Allow | ||||||
|  |           Principal: | ||||||
|  |             Service: | ||||||
|  |             - ecs-tasks.amazonaws.com | ||||||
|  |           Action: | ||||||
|  |           - sts:AssumeRole | ||||||
|  |       ManagedPolicyArns: | ||||||
|  |         - arn:aws:iam::aws:policy/CloudWatchLogsFullAccess | ||||||
|  |   EcsExecutionPolicy: | ||||||
|  |     Condition: RepositoryCredentials | ||||||
|  |     Type: AWS::IAM::Policy | ||||||
|  |     Properties: | ||||||
|  |       PolicyName: AllowGettingSecrets | ||||||
|  |       Roles: | ||||||
|  |         - !Ref EcsExecutionerRole | ||||||
|  |       PolicyDocument: | ||||||
|  |         Statement: | ||||||
|  |           - Sid: ReadDockerSecret | ||||||
|  |             Action: | ||||||
|  |               - secretsmanager:Describe* | ||||||
|  |               - secretsmanager:Get* | ||||||
|  |               - secretsmanager:List* | ||||||
|  |             Effect: Allow | ||||||
|  |             Resource: !Ref RepositoryCredentialsSecret | ||||||
|  |  | ||||||
|   AdminPortalPassword: |   AdminPortalPassword: | ||||||
|     Type: AWS::SecretsManager::Secret |     Type: AWS::SecretsManager::Secret | ||||||
|     Condition: CreateSecret |     Condition: CreateSecret | ||||||
| @ -68,6 +100,7 @@ Resources: | |||||||
|   TaskDefinition: |   TaskDefinition: | ||||||
|     Type: AWS::ECS::TaskDefinition |     Type: AWS::ECS::TaskDefinition | ||||||
|     Properties: |     Properties: | ||||||
|  |       ExecutionRoleArn: !Ref EcsExecutionerRole | ||||||
|       ContainerDefinitions: |       ContainerDefinitions: | ||||||
|       - !If |       - !If | ||||||
|         - NoRepositoryCredentials |         - NoRepositoryCredentials | ||||||
|  | |||||||
		Reference in New Issue
	
	Block a user