Skip to content

Commit

Permalink
fix role deletion
Browse files Browse the repository at this point in the history
  • Loading branch information
nmarukovich committed Nov 10, 2024
1 parent b11ec77 commit 8313fc4
Show file tree
Hide file tree
Showing 2 changed files with 23 additions and 4 deletions.
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Federated": "arn:aws:iam::119175775298:oidc-provider/oidc.eks.eu-west-3.amazonaws.com/id/D3BF3A9D31066A3A7AB57C03F9543A3C"
},
"Action": "sts:AssumeRoleWithWebIdentity",
"Condition": {
"StringEquals": {
"oidc.eks.eu-west-3.amazonaws.com/id/D3BF3A9D31066A3A7AB57C03F9543A3C:aud": "sts.amazonaws.com"
}
}
}
]
}
10 changes: 6 additions & 4 deletions e2e-tests/demand-backup-eks-credentials-irsa/run
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,12 @@ eks_cluster_oidc=$(aws eks describe-cluster --name $eks_cluster_name --region=$e
policy_arn="arn:aws:iam::119175775298:policy/operator-testing-access-s3"
role_name="$cluster-psmdb-access-s3-bucket"

desc "delete role "
echo $role_name
echo $policy_arn
aws iam detach-role-policy --role-name "$role_name" --policy-arn "$policy_arn" || true
aws iam delete-role --role-name "$role_name" || true

# Create policy. Already done, we don't need to do it every time. But all steps should be illustrated in the test
#aws iam create-policy --policy-name operator-testing-allow-access-s3 --policy-document file://conf/s3-bucket-policy.json

Expand Down Expand Up @@ -128,8 +134,4 @@ check_backup_deletion "https://s3.amazonaws.com/${backup_dest_aws}" "aws-s3"

destroy $namespace

desc "delete role"
aws iam detach-role-policy --role-name "$role_name" --policy-arn "$policy_arn"
aws iam delete-role --role-name "$role_name"

desc 'test passed'

0 comments on commit 8313fc4

Please sign in to comment.