You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Mar 13, 2023. It is now read-only.
* use gh secrets
* use gh secrets also for prod
* infra bucket dynamic lookup and documentation update
* temporary trigger deploy from remove-sensitive-info branch to test actions
* adding additional required policy
* allow correct resource for description
* fix cf stack update params handling
* Revert "temporary trigger deploy from remove-sensitive-info branch to test actions"
This reverts commit d97a32e.
* typo fix
Copy file name to clipboardExpand all lines: infrastructure/README.md
+8-6
Original file line number
Diff line number
Diff line change
@@ -4,14 +4,16 @@ To access AWS resources inside a Github workflow you need to create new IAM role
4
4
To create the resources needed by the workflow action you can deploy the `./github-env-setup.yml` to [CloudFormation](https://aws.amazon.com/cloudformation/).
5
5
- Go under `CloudFormation > Stacks > Create stack`
6
6
- Upload a template file using `github-env-setup.yml`
7
-
- Give the stack a name (it doesn't matter which one)
7
+
- Give the stack a name (it should match the `INFRA_BUCKET_STACK_NAME` for env deploy, i.e. `INFRA_BUCKET_STACK_NAME=pcluster-manager-github` for the demo env)
8
8
- Create the stack
9
-
- Go to the IAM console, find the role name `*PrivateDeploy*`, copy the ARN and use it with the [AWS credentials action](https://github.com/marketplace/actions/configure-aws-credentials-action-for-github-actions) to authenticate
10
-
- Same needs to be done for the `*PrivateInfrastructureUpdateRole*` role
9
+
- Go to the IAM console, find the roles created (see list below), copy the ARN and use it with the [AWS credentials action](https://github.com/marketplace/actions/configure-aws-credentials-action-for-github-actions) to authenticate using those in the matching GitHub Secrets
11
10
12
-
The stack will create two new roles:
13
-
- the `PrivateDeployRole` with the minimum set of policies needed to build and deploy an instance of PCluster Manager
14
-
- the `PrivateInfrastructureUpdateRole` with the minimum set of policies needed to update the infrastructure of an environment running PCluster Manager
11
+
The stack will create three new roles:
12
+
- the `PrivateDeployRole` with the minimum set of policies needed to build and deploy an instance of PCluster Manager, its arn should be put in the secret named `ACTION_DEMO_DEPLOY_JOB_BUILD_AND_DEPLOY_ROLE`
13
+
- the `PrivateInfrastructureUpdateRole` with the minimum set of policies needed to update the infrastructure of an environment running PCluster Manager, its arn should be put in the secret named `ACTION_DEMO_DEPLOY_JOB_UPDATE_INFRASTRUCTURE_ROLE`
14
+
- the `E2ETestExecutionRole` with the minimum set of policies needed to in order to run E2E tests workflow, its arn should be put in the secret named `ACTION_E2E_TESTS_ROLE`
15
+
16
+
The same steps are required for the production release workflow, using the `./github-env-setup-prod.yml` stack, to create the role `ProductionDeploy` that should be put in the secret named `ACTION_PRODUCTION_RELEASE_ROLE`.
15
17
16
18
**This procedure must be done only once per AWS account since IAM it's a global service.**
0 commit comments