@@ -6,14 +6,14 @@ pipeline {
6
6
choice(name : ' action' , choices : ' create\n destroy' , description : ' Create/update or destroy the eks cluster.' )
7
7
string(name : ' aws_region' , defaultValue : ' us-west-2' , description : " AWS region." )
8
8
string(name : ' env' , defaultValue : ' la' , description : " lab environment" )
9
- string(name : ' rolename' , defaultValue : ' aws-jenkins' , description : " default aws role for jenkins" )
10
- string(name : ' role-account' , defaultValue : ' 843653485881 ' , description : " default aws role account for jenkins" )
9
+ // string(name: 'rolename', defaultValue: 'aws-jenkins', description: "default aws role for jenkins")
10
+ // string(name: 'role-account', defaultValue: '534992115889 ', description: "default aws role account for jenkins")
11
11
string(name : ' cluster' , defaultValue : ' twistlock-eks-terraform' , description : " eks cluster name" )
12
12
string(name : ' cidrblock' , defaultValue : ' 10.123.0.0/16' , description : " First 2 octets of vpc network; eg 10.0" )
13
13
string(name : ' cidr_public' , defaultValue : ' ["10.123.1.0/24","10.123.2.0/24"]' , description : " cidr block for public subnets" )
14
14
string(name : ' cidr_private' , defaultValue : ' ["10.123.3.0/24","10.123.4.0/24"]' , description : " cidr block for private subnets" )
15
15
string(name : ' count' , defaultValue : ' 2' , description : " Number of vpc subnets/AZs." )
16
- // string(name: 'credential', defaultValue : 'aws- jenkins', description: "Jenkins credential that provides the AWS access key and secret.")
16
+ string(name : ' credential' , defaultValue : ' jenkins-la ' , description : " Jenkins credential that provides the AWS access key and secret." )
17
17
string(name : ' accessIp' , defaultValue : ' 0.0.0.0/0' , description : " cidr block for bastion host restrict to your ip or vpn" )
18
18
string(name : ' instancetype' , defaultValue : ' t2.micro' , description : " instance type for ec2" )
19
19
string(name : ' keyname' , defaultValue : ' tfs-key' , description : " keyname to be used for ssh access to ec2 vm" )
@@ -25,7 +25,7 @@ pipeline {
25
25
options {
26
26
disableConcurrentBuilds()
27
27
timeout(time : 1 , unit : ' HOURS' )
28
- // withAWS(credentials: params.credential, region: params.region )
28
+ withAWS(credentials : params. credential, region : params. aws_region )
29
29
}
30
30
31
31
agent { label ' master' }
@@ -67,7 +67,11 @@ pipeline {
67
67
}
68
68
steps {
69
69
script {
70
- withAWS([profile :${params. env}, region :${params. aws_region}, role :${params. rolename}, roleAccount :${params. role- account}]) {
70
+ // withAWS([profile:${params.env}, region:${params.aws_region}, role:${params.rolename}, roleAccount:${params.role-account}])
71
+ withCredentials([[$class : ' AmazonWebServicesCredentialsBinding' ,
72
+ credentialsId : params. credential,
73
+ accessKeyVariable : ' AWS_ACCESS_KEY_ID' ,
74
+ secretKeyVariable : ' AWS_SECRET_ACCESS_KEY' ]]) {
71
75
72
76
73
77
sh """
@@ -96,8 +100,11 @@ pipeline {
96
100
script {
97
101
input " Create/update Terraform stack eks-${ params.cluster} in aws?"
98
102
99
- withAWS([profile :${params. env}, region :${params. aws_region}, role :${params. rolename}, roleAccount :${params. role- account}]) {
100
-
103
+ // withAWS([profile:${params.env}, region:${params.aws_region}, role:${params.rolename}, roleAccount:${params.role-account}]) {
104
+ withCredentials([[$class : ' AmazonWebServicesCredentialsBinding' ,
105
+ credentialsId : params. credential,
106
+ accessKeyVariable : ' AWS_ACCESS_KEY_ID' ,
107
+ secretKeyVariable : ' AWS_SECRET_ACCESS_KEY' ]]) {
101
108
sh """
102
109
cd terraform-aws-secure-webapplication
103
110
terraform apply -input=false -auto-approve ${ plan}
@@ -115,8 +122,11 @@ pipeline {
115
122
script {
116
123
input " Destroy Terraform stack eks-${ params.cluster} in aws?"
117
124
118
- withAWS([profile :${params. env}, region :${params. aws_region}, role :${params. rolename}, roleAccount :${params. role- account}]) {
119
-
125
+ // withAWS([profile:${params.env}, region:${params.aws_region}, role:${params.rolename}, roleAccount:${params.role-account}]) {
126
+ withCredentials([[$class : ' AmazonWebServicesCredentialsBinding' ,
127
+ credentialsId : params. credential,
128
+ accessKeyVariable : ' AWS_ACCESS_KEY_ID' ,
129
+ secretKeyVariable : ' AWS_SECRET_ACCESS_KEY' ]]) {
120
130
sh """
121
131
cd terraform-aws-secure-webapplication
122
132
terraform destroy -auto-approve
0 commit comments