Justin Rhee vor 3 Jahren
Ursprung
Commit
fbfbd33c50

+ 68 - 68
zarf/cloudformation-policy.json

@@ -1,70 +1,70 @@
 {
-    "AWSTemplateFormatVersion": "2010-09-09",
-    "Resources": {
-        "PorterRole": {
-            "Type": "AWS::IAM::Role",
-            "Properties": {
-                "AssumeRolePolicyDocument": {
-                    "Version": "2012-10-17",
-                    "Statement": [
-                        {
-                            "Effect": "Allow",
-                            "Principal": {
-                                "AWS": [
-                                    "arn:aws:iam::108458755588:role/CAPIManagement"
-                                ]
-                            },
-                            "Condition": {
-                                "StringEquals": {
-                                    "sts:ExternalId": {
-                                        "Ref": "ExternalIdParameter"
-                                    }
-                                }   
-                            },
-                            "Action": [
-                                "sts:AssumeRole"
-                            ]
-                        },
-                        {
-                            "Effect": "Allow",
-                            "Principal": {
-                                "Service": [
-                                    "ec2.amazonaws.com"
-                                ]
-                            },
-                            "Action": [
-                                "sts:AssumeRole"
-                            ]
-                        },
-                        {
-                            "Effect": "Allow",
-                            "Principal": {
-                                "Service": [
-                                    "eks.amazonaws.com"
-                                ]
-                            },
-                            "Action": [
-                                "sts:AssumeRole"
-                            ]
-                        }
-                    ]
-                },
-                "Path": "/",
-                "ManagedPolicyArns": [
-                    "arn:aws:iam::aws:policy/AdministratorAccess",
-                    "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy",
-                    "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy",
-                    "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly",
-                    "arn:aws:iam::aws:policy/service-role/AmazonEBSCSIDriverPolicy"
-                ],
-                "RoleName": "PorterRole"
-            }
-        }
-    },
-    "Parameters": {
-        "ExternalIdParameter": {
-            "Type" : "String",
-            "Description": "External ID required for CAPIManagement role to access target ARN."
-        }
-    }
+  "AWSTemplateFormatVersion": "2010-09-09",
+  "Resources": {
+      "PorterRole": {
+          "Type": "AWS::IAM::Role",
+          "Properties": {
+              "AssumeRolePolicyDocument": {
+                  "Version": "2012-10-17",
+                  "Statement": [
+                      {
+                          "Effect": "Allow",
+                          "Principal": {
+                              "AWS": [
+                                  "arn:aws:iam::108458755588:role/CAPIManagement"
+                              ]
+                          },
+                          "Condition": {
+                              "StringEquals": {
+                                  "sts:ExternalId": {
+                                      "Ref": "ExternalIdParameter"
+                                  }
+                              }   
+                          },
+                          "Action": [
+                              "sts:AssumeRole"
+                          ]
+                      },
+                      {
+                          "Effect": "Allow",
+                          "Principal": {
+                              "Service": [
+                                  "ec2.amazonaws.com"
+                              ]
+                          },
+                          "Action": [
+                              "sts:AssumeRole"
+                          ]
+                      },
+                      {
+                          "Effect": "Allow",
+                          "Principal": {
+                              "Service": [
+                                  "eks.amazonaws.com"
+                              ]
+                          },
+                          "Action": [
+                              "sts:AssumeRole"
+                          ]
+                      }
+                  ]
+              },
+              "Path": "/",
+              "ManagedPolicyArns": [
+                  "arn:aws:iam::aws:policy/AdministratorAccess",
+                  "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy",
+                  "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy",
+                  "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly",
+                  "arn:aws:iam::aws:policy/service-role/AmazonEBSCSIDriverPolicy"
+              ],
+              "RoleName": "PorterRole"
+          }
+      }
+  },
+  "Parameters": {
+      "ExternalIdParameter": {
+          "Type" : "String",
+          "Description": "External ID required for CAPIManagement role to access target ARN."
+      }
+  }
 }

+ 0 - 10
zarf/docker/Dockerfile.dashboard.tilt

@@ -1,10 +0,0 @@
-FROM node:16
-WORKDIR /app
-
-# COPY dashboard /app/
-
-ENV NODE_ENV=development
-
-# RUN npm ci --legacy-peer-deps
-RUN npm i -g webpack-dev-server@3.11.0 webpack-cli@3.3.12
-

+ 1 - 1
zarf/docker/Dockerfile.server.tilt

@@ -7,4 +7,4 @@ FROM debian:bullseye-slim as runner
 WORKDIR /app
 COPY --from=installer /etc/ssl/certs/ca-certificates.crt /etc/ssl/certs/
 COPY --from=installer /go/bin/dlv /
-COPY ./bin/porter /app
+COPY ./bin/porter /app

+ 0 - 12
zarf/helm/.dashboardenv

@@ -1,12 +0,0 @@
-# Fill out this file, and renamed to '.dashboard.env' in order to run this with Tilt
-NODE_ENV=development
-
-# Tell the webpack dev server in wich port we wanna run, it defaults to 8080 but we have to be carefull this is not the same port as the backend
-DEV_SERVER_PORT=8081
-
-# Usually we would use nginx, but for this environment we're going to enable webpack-dev-server proxy 
-ENABLE_PROXY=true 
-
-# API server url, this url will be used for the proxy to redirect all /api calls
-API_SERVER=http://localhost:8080 
-