@@ -86,85 +86,7 @@ data "aws_iam_policy_document" "github_actions_permissions" {
8686 " sts:GetAccessKeyInfo" ,
8787 " sts:GetCallerIdentity" ,
8888 " sts:GetFederationToken" ,
89- " sts:TagSession" ,
90- ]
91- resources = [" *" ]
92- }
93-
94- # EKS Cluster permissions
95- statement {
96- sid = " EKSClusterPermissions"
97- effect = " Allow"
98- actions = [
99- " eks:CreateCluster" ,
100- " eks:DeleteCluster" ,
101- " eks:DescribeCluster" ,
102- " eks:ListClusters" ,
103- " eks:UpdateClusterConfig" ,
104- " eks:UpdateClusterVersion" ,
105- " eks:TagResource" ,
106- " eks:UntagResource" ,
107- " eks:ListTagsForResource"
108- ]
109- resources = [" *" ]
110- }
111-
112- # EKS Node Group permissions
113- statement {
114- sid = " EKSNodeGroupPermissions"
115- effect = " Allow"
116- actions = [
117- " eks:CreateNodegroup" ,
118- " eks:DeleteNodegroup" ,
119- " eks:DescribeNodegroup" ,
120- " eks:ListNodegroups" ,
121- " eks:UpdateNodegroupConfig" ,
122- " eks:UpdateNodegroupVersion"
123- ]
124- resources = [" *" ]
125- }
126-
127- # EC2 permissions for EKS
128- statement {
129- sid = " EC2Permissions"
130- effect = " Allow"
131- actions = [
132- " ec2:CreateVpc" ,
133- " ec2:DeleteVpc" ,
134- " ec2:DescribeVpcs" ,
135- " ec2:ModifyVpcAttribute" ,
136- " ec2:CreateSubnet" ,
137- " ec2:DeleteSubnet" ,
138- " ec2:DescribeSubnets" ,
139- " ec2:ModifySubnetAttribute" ,
140- " ec2:CreateInternetGateway" ,
141- " ec2:DeleteInternetGateway" ,
142- " ec2:DescribeInternetGateways" ,
143- " ec2:AttachInternetGateway" ,
144- " ec2:DetachInternetGateway" ,
145- " ec2:CreateRouteTable" ,
146- " ec2:DeleteRouteTable" ,
147- " ec2:DescribeRouteTables" ,
148- " ec2:CreateRoute" ,
149- " ec2:DeleteRoute" ,
150- " ec2:AssociateRouteTable" ,
151- " ec2:DisassociateRouteTable" ,
152- " ec2:CreateSecurityGroup" ,
153- " ec2:DeleteSecurityGroup" ,
154- " ec2:DescribeSecurityGroups" ,
155- " ec2:AuthorizeSecurityGroupIngress" ,
156- " ec2:AuthorizeSecurityGroupEgress" ,
157- " ec2:RevokeSecurityGroupIngress" ,
158- " ec2:RevokeSecurityGroupEgress" ,
159- " ec2:CreateTags" ,
160- " ec2:DeleteTags" ,
161- " ec2:DescribeTags" ,
162- " ec2:DescribeInstances" ,
163- " ec2:DescribeInstanceTypes" ,
164- " ec2:RunInstances" ,
165- " ec2:TerminateInstances" ,
166- " ec2:DescribeAvailabilityZones" ,
167- " ec2:DescribeRegions"
89+ " sts:TagSession"
16890 ]
16991 resources = [" *" ]
17092 }
@@ -194,18 +116,32 @@ data "aws_iam_policy_document" "github_actions_permissions" {
194116 resources = [" *" ]
195117 }
196118
119+ # EKS Cluster permissions
120+ statement {
121+ sid = " EKSClusterPermissions"
122+ effect = " Allow"
123+ actions = [
124+ " eks:*"
125+ ]
126+ resources = [" *" ]
127+ }
128+
129+ # EC2 permissions for EKS
130+ statement {
131+ sid = " EC2Permissions"
132+ effect = " Allow"
133+ actions = [
134+ " ec2:*"
135+ ]
136+ resources = [" *" ]
137+ }
138+
197139 # CloudFormation permissions (EKS uses CloudFormation)
198140 statement {
199141 sid = " CloudFormationPermissions"
200142 effect = " Allow"
201143 actions = [
202- " cloudformation:CreateStack" ,
203- " cloudformation:DeleteStack" ,
204- " cloudformation:DescribeStacks" ,
205- " cloudformation:DescribeStackEvents" ,
206- " cloudformation:DescribeStackResources" ,
207- " cloudformation:ListStacks" ,
208- " cloudformation:UpdateStack"
144+ " cloudformation:*"
209145 ]
210146 resources = [" *" ]
211147 }
@@ -215,14 +151,7 @@ data "aws_iam_policy_document" "github_actions_permissions" {
215151 sid = " AutoScalingPermissions"
216152 effect = " Allow"
217153 actions = [
218- " autoscaling:CreateAutoScalingGroup" ,
219- " autoscaling:DeleteAutoScalingGroup" ,
220- " autoscaling:DescribeAutoScalingGroups" ,
221- " autoscaling:DescribeAutoScalingInstances" ,
222- " autoscaling:UpdateAutoScalingGroup" ,
223- " autoscaling:CreateLaunchConfiguration" ,
224- " autoscaling:DeleteLaunchConfiguration" ,
225- " autoscaling:DescribeLaunchConfigurations"
154+ " autoscaling:*"
226155 ]
227156 resources = [" *" ]
228157 }
0 commit comments