diff --git a/Makefile b/Makefile deleted file mode 100644 index 5df1979..0000000 --- a/Makefile +++ /dev/null @@ -1,12 +0,0 @@ - - - -talos: - kubectl get secret cloudlab-talos -n cluster -o json | jq -r ".data.bundle" | base64 -D - -talos-config: - kubectl get secret cloudlab-talosconfig -n cluster -o json | jq -r ".data.talosconfig" | base64 -D > ${HOME}/.talos/config - -cleanup: - unset KUBECONFIG; - kustomize build --enable-helm manifests/prod/cluster | kubectl delete -f -; diff --git a/terraform/modules/external_secrets_iam_user/main.tf b/terraform/modules/external_secrets_iam_user/main.tf deleted file mode 100644 index 2b81cf3..0000000 --- a/terraform/modules/external_secrets_iam_user/main.tf +++ /dev/null @@ -1,30 +0,0 @@ - -resource "aws_iam_user" "external_secrets" { - name = "${var.env}_external_secrets" - path = "/system/${var.env}" -} - -resource "aws_iam_access_key" "external_secrets" { - user = aws_iam_user.external_secrets.name -} - -module "parameter_store_policy_document" { - source = "cloudposse/ssm-parameter-store-policy-documents/aws" - version = "0.1.3" - - parameter_root_name = "/cloudlab/${var.env}/*" - account_id = var.aws_account_id - region = var.aws_region -} - -resource "aws_iam_policy" "parameter_store_environmental_read_only" { - name_prefix = "${var.env}_parameter_store_read_only" - description = "Grants read access to all secrets stored under /cloudlab/${var.env}/*" - path = "/system/${var.env}" - policy = module.parameter_store_policy_document.read_parameter_store_policy -} - -resource "aws_iam_user_policy_attachment" "machine_user_policy_attachment" { - user = aws_iam_user.external_secrets.name - policy_arn = aws_iam_policy.parameter_store_environmental_read_only.arn -} diff --git a/terraform/modules/external_secrets_iam_user/output.tf b/terraform/modules/external_secrets_iam_user/output.tf deleted file mode 100644 index e69de29..0000000 diff --git a/terraform/modules/external_secrets_iam_user/provider.tf b/terraform/modules/external_secrets_iam_user/provider.tf deleted file mode 100644 index 930a91e..0000000 --- a/terraform/modules/external_secrets_iam_user/provider.tf +++ /dev/null @@ -1,18 +0,0 @@ -terraform { - required_providers { - aws = { - source = "hashicorp/aws" - version = "~> 4.0" - } - } -} - -provider "aws" { - region = var.aws_region - - default_tags = { - env = local.env - managed_by = "terraform" - repo = "github.com/cyclingwithelephants/cloudlab" - } -} diff --git a/terraform/modules/external_secrets_iam_user/vars.tf b/terraform/modules/external_secrets_iam_user/vars.tf deleted file mode 100644 index d8a3324..0000000 --- a/terraform/modules/external_secrets_iam_user/vars.tf +++ /dev/null @@ -1,13 +0,0 @@ -variable "env" { - type = string -} - -variable "aws_region" { - default = "eu-west-2" - type = string -} - -variable "aws_account_id" { - default = "the aws account ID of the parameter store you want to allow access to." - type = string -}