Skip to content

Commit 2030881

Browse files
authored
chore(iam): follow the best practice to use "AmazonEC2ContainerRegistryPullOnly" only (#1183)
1 parent ec934e3 commit 2030881

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

java/eks/fargate-cluster/src/test/resources/com/amazonaws/cdk/EksFargateStackExpected.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@
104104
{
105105
"Ref": "AWS::Partition"
106106
},
107-
":iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
107+
":iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
108108
]
109109
]
110110
},

java/eks/private-cluster/src/main/java/com/amazonaws/cdk/examples/EksPrivateClusterStack.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -175,7 +175,7 @@ private void createBastion(Role clusterAdmin) {
175175
client
176176
.getRole()
177177
.addManagedPolicy(
178-
ManagedPolicy.fromAwsManagedPolicyName("AmazonEC2ContainerRegistryReadOnly"));
178+
ManagedPolicy.fromAwsManagedPolicyName("AmazonEC2ContainerRegistryPullOnly"));
179179
// access to read assets from S3 bucket e.g. kubectl, awscliv2, etc
180180
client
181181
.getRole()

typescript/eks/cluster/index.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ class EKSCluster extends cdk.Stack {
5151
assumedBy: new iam.ServicePrincipal("ec2.amazonaws.com"),
5252
managedPolicies: [
5353
"AmazonEKSWorkerNodePolicy",
54-
"AmazonEC2ContainerRegistryReadOnly",
54+
"AmazonEC2ContainerRegistryPullOnly",
5555
"AmazonEKS_CNI_Policy",
5656
].map((policy) => iam.ManagedPolicy.fromAwsManagedPolicyName(policy)),
5757
}),

0 commit comments

Comments
 (0)