This repository was archived by the owner on Mar 27, 2023. It is now read-only.
File tree Expand file tree Collapse file tree 4 files changed +42
-21
lines changed Expand file tree Collapse file tree 4 files changed +42
-21
lines changed Original file line number Diff line number Diff line change @@ -36,6 +36,13 @@ def __init__(
36
36
command = ["/start_prod.sh" ],
37
37
)
38
38
39
+ scope .assets .assets_bucket .grant_read_write (
40
+ self .backend_task .task_role
41
+ )
42
+
43
+ for secret in [scope .variables .django_secret_key , scope .rds .db_secret ]:
44
+ secret .grant_read (self .backend_task .task_role )
45
+
39
46
port_mapping = ecs .PortMapping (
40
47
container_port = 8000 , protocol = ecs .Protocol .TCP
41
48
)
Original file line number Diff line number Diff line change @@ -25,6 +25,9 @@ def __init__(
25
25
self , "MigrateTask" , family = f"{ full_app_name } -migrate"
26
26
)
27
27
28
+ for secret in [scope .variables .django_secret_key , scope .rds .db_secret ]:
29
+ secret .grant_read (self .migrate_task .task_role )
30
+
28
31
self .migrate_task .add_container (
29
32
"MigrateCommand" ,
30
33
image = image ,
@@ -38,6 +41,13 @@ def __init__(
38
41
self , "CollecstaticTask" , family = f"{ full_app_name } -collectstatic"
39
42
)
40
43
44
+ scope .assets .assets_bucket .grant_read_write (
45
+ self .collectstatic_task .task_role
46
+ )
47
+
48
+ for secret in [scope .variables .django_secret_key , scope .rds .db_secret ]:
49
+ secret .grant_read (self .collectstatic_task .task_role )
50
+
41
51
self .collectstatic_task .add_container (
42
52
"CollecstaticCommand" ,
43
53
image = image ,
@@ -55,6 +65,9 @@ def __init__(
55
65
family = f"{ full_app_name } -create-superuser" ,
56
66
)
57
67
68
+ for secret in [scope .variables .django_secret_key , scope .rds .db_secret ]:
69
+ secret .grant_read (self .create_superuser_task .task_role )
70
+
58
71
self .create_superuser_task .add_container (
59
72
"CreateSuperuserCommand" ,
60
73
image = image ,
Original file line number Diff line number Diff line change @@ -139,9 +139,9 @@ def __init__(
139
139
# TODO: loop over all task roles to grant bucket permissions
140
140
# give the backend service read/write access to the assets bucket
141
141
task_roles = [
142
- self .backend .backend_task .task_role ,
143
- self .backend_tasks .collectstatic_task .task_role ,
144
- self .backend_tasks .create_superuser_task .task_role ,
142
+ # self.backend.backend_task.task_role,
143
+ # self.backend_tasks.collectstatic_task.task_role,
144
+ # self.backend_tasks.create_superuser_task.task_role,
145
145
# self.celery_worker_service.celery_default_worker_task.task_role,
146
146
self .celery_worker_service .celery_default_worker_service .task_definition .task_role ,
147
147
]
Original file line number Diff line number Diff line change @@ -1400,6 +1400,25 @@ Resources:
1400
1400
Value : dev-mysite-com
1401
1401
Metadata :
1402
1402
aws:cdk:path : dev-mysite-com-stack/BackendTasks/MigrateTask/TaskRole/Resource
1403
+ BackendTasksMigrateTaskTaskRoleDefaultPolicyB1599105 :
1404
+ Type : AWS::IAM::Policy
1405
+ Properties :
1406
+ PolicyDocument :
1407
+ Statement :
1408
+ - Action : secretsmanager:GetSecretValue
1409
+ Effect : Allow
1410
+ Resource :
1411
+ Ref : VariablesDjangoSecretKeyE4FA41EE
1412
+ - Action : secretsmanager:GetSecretValue
1413
+ Effect : Allow
1414
+ Resource :
1415
+ Ref : RdsDBClusterDBSecret28397CCA
1416
+ Version : " 2012-10-17"
1417
+ PolicyName : BackendTasksMigrateTaskTaskRoleDefaultPolicyB1599105
1418
+ Roles :
1419
+ - Ref : BackendTasksMigrateTaskTaskRoleAE7059C2
1420
+ Metadata :
1421
+ aws:cdk:path : dev-mysite-com-stack/BackendTasks/MigrateTask/TaskRole/DefaultPolicy/Resource
1403
1422
BackendTasksMigrateTask9BDCB431 :
1404
1423
Type : AWS::ECS::TaskDefinition
1405
1424
Properties :
@@ -1746,24 +1765,6 @@ Resources:
1746
1765
Properties :
1747
1766
PolicyDocument :
1748
1767
Statement :
1749
- - Action :
1750
- - s3:GetObject*
1751
- - s3:GetBucket*
1752
- - s3:List*
1753
- - s3:DeleteObject*
1754
- - s3:PutObject*
1755
- - s3:Abort*
1756
- Effect : Allow
1757
- Resource :
1758
- - Fn::GetAtt :
1759
- - BackendAssetsAssetsBucket62473847
1760
- - Arn
1761
- - Fn::Join :
1762
- - " "
1763
- - - Fn::GetAtt :
1764
- - BackendAssetsAssetsBucket62473847
1765
- - Arn
1766
- - /*
1767
1768
- Action : secretsmanager:GetSecretValue
1768
1769
Effect : Allow
1769
1770
Resource :
You can’t perform that action at this time.
0 commit comments