create_aws_user.sh 986 B

12345678910111213141516171819
  1. #! /bin/bash
  2. #
  3. # Creates an AWS user that can create DNS entries for lets encrypt wildcard certificates
  4. aws iam create-policy --policy-name letsencrypt-wildcard --policy-document file://json/letsencrypt-wildcard.json
  5. LE_POLICY_ARN=$(aws iam list-policies --output json --query 'Policies[*].[PolicyName,Arn]' --output text | grep letsencrypt-wildcard | awk '{print $2}')
  6. aws iam create-group --group-name letsencrypt-wildcard
  7. aws iam attach-group-policy --policy-arn ${LE_POLICY_ARN} --group-name letsencrypt-wildcard
  8. aws iam create-user --user-name letsencrypt-wildcard
  9. aws iam add-user-to-group --user-name letsencrypt-wildcard --group-name letsencrypt-wildcard
  10. aws iam create-access-key --user-name letsencrypt-wildcard
  11. #Now on the k8s server, run:
  12. #AWS_ACCESS_KEY_ID=your-access-id
  13. #AWS_SECRET_ACCESS_KEY=your-access-secret
  14. #echo ${AWS_SECRET_ACCESS_KEY} > password.txt
  15. #kubectl create secret generic aws-route53-creds --from-file=password.txt -n cert-manager
  16. #rm -f password.txt