-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
build: add support for execution role deployment #23
Conversation
This change introduces a new `deploy` top-level project directory that contains parameterized CloudFormation templates that can be used to deploy the required Starfleet execution roles. The following CloudFormation templates are included: The `starfleet-execution-role-stackset.yml` template supports deployment through CloudFormation StackSets and allows users to target deployment to all member accounts in an AWS Organization or specific targets (e.g. OUs, accounts, etc.). The `starfleet-execution-role-org-management.yml` template is intended to be deployed as a standard CloudFormation Stack in the organization management account. The template creates a role for the Starfleet Account Index Generator and a standard Starfleet Worker execution role. Both templates enforce strict input checking for all parameters and implement least-privilege policies. Lastly, this change includes new `tox` environments to check CloudFormation templates for linting and security misconfigurations.
There seems to be a regression with:
That's very strange that it would break SQS... |
This is the issue: getmoto/moto#6286 |
@ericwestfall in the meantime, let's pin to the older versions of
|
The underlying change in |
LGTM. The next step will be to update the docs to reference how to use the CF templates for the role. |
This change introduces a new
deploy
top-level project directory that contains parameterized CloudFormation templates that can be used to deploy the required Starfleet execution roles.The following CloudFormation templates are included:
The
starfleet-execution-role-stackset.yml
template supports deployment through CloudFormation StackSets and allows users to target deployment to all member accounts in an AWS Organization or specific targets (e.g. OUs, accounts, etc.).The
starfleet-execution-role-org-management.yml
template is intended to be deployed as a standard CloudFormation Stack in the organization management account. The template creates a role for the Starfleet Account Index Generator and a standard Starfleet Worker execution role.Both templates enforce strict input checking for all parameters and implement least-privilege policies. Lastly, this change includes new
tox
environments to check CloudFormation templates for linting and security misconfigurations.