Compare commits

2 Commits

View File

@ -3,7 +3,7 @@ Description: Nakama ECS Task
Parameters: Parameters:
ServerName: ServerName:
Type: String Type: String
Default: "nakama-default" Default: "main"
NakamaContainer: NakamaContainer:
Type: String Type: String
Description: test Description: test
@ -46,9 +46,41 @@ Parameters:
Conditions: Conditions:
CreateSecret: !Equals [!Ref NakamaPasswordOverride, ""] CreateSecret: !Equals [!Ref NakamaPasswordOverride, ""]
NoRepositoryCredentials: !Equals [!Ref RepositoryCredentialsSecret, ""] NoRepositoryCredentials: !Equals [!Ref RepositoryCredentialsSecret, ""]
RepositoryCredentials: !Not [!Equals [!Ref RepositoryCredentialsSecret, ""]]
Resources: Resources:
EcsExecutionerRole:
Type: AWS::IAM::Role
Properties:
AssumeRolePolicyDocument:
Version: '2012-10-17'
Statement:
- Effect: Allow
Principal:
Service:
- ecs-tasks.amazonaws.com
Action:
- sts:AssumeRole
ManagedPolicyArns:
- arn:aws:iam::aws:policy/CloudWatchLogsFullAccess
EcsExecutionPolicy:
Condition: RepositoryCredentials
Type: AWS::IAM::Policy
Properties:
PolicyName: AllowGettingSecrets
Roles:
- !Ref EcsExecutionerRole
PolicyDocument:
Statement:
- Sid: ReadDockerSecret
Action:
- secretsmanager:Describe*
- secretsmanager:Get*
- secretsmanager:List*
Effect: Allow
Resource: !Ref RepositoryCredentialsSecret
AdminPortalPassword: AdminPortalPassword:
Type: AWS::SecretsManager::Secret Type: AWS::SecretsManager::Secret
Condition: CreateSecret Condition: CreateSecret
@ -68,6 +100,7 @@ Resources:
TaskDefinition: TaskDefinition:
Type: AWS::ECS::TaskDefinition Type: AWS::ECS::TaskDefinition
Properties: Properties:
ExecutionRoleArn: !Ref EcsExecutionerRole
ContainerDefinitions: ContainerDefinitions:
- !If - !If
- NoRepositoryCredentials - NoRepositoryCredentials