Skip to content

Commit 0010a9f

Browse files
committed
SME changes
1 parent e9639b9 commit 0010a9f

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

cloud_experts_tutorials/cloud-experts-aws-secret-manager.adoc

+5-5
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,7 @@ $ oc label csidriver.storage.k8s.io/secrets-store.csi.k8s.io security.openshift.
142142
$ SECRET_ARN=$(aws --region "$REGION" secretsmanager create-secret \
143143
--name MySecret --secret-string \
144144
'{"username":"shadowman", "password":"hunter2"}' \
145-
--query ARN --output text); $ echo $SECRET_ARN
145+
--query ARN --output text); echo $SECRET_ARN
146146
----
147147

148148
. Create an IAM Access Policy document by running the following command:
@@ -171,7 +171,7 @@ EOF
171171
$ POLICY_ARN=$(aws --region "$REGION" --query Policy.Arn \
172172
--output text iam create-policy \
173173
--policy-name openshift-access-to-mysecret-policy \
174-
--policy-document file://policy.json); $ echo $POLICY_ARN
174+
--policy-document file://policy.json); echo $POLICY_ARN
175175
----
176176

177177
. Create an IAM Role trust policy document by running the following command:
@@ -210,7 +210,7 @@ EOF
210210
----
211211
$ ROLE_ARN=$(aws iam create-role --role-name openshift-access-to-mysecret \
212212
--assume-role-policy-document file://trust-policy.json \
213-
--query Role.Arn --output text); $ echo $ROLE_ARN
213+
--query Role.Arn --output text); echo $ROLE_ARN
214214
----
215215

216216
. Attach the role to the policy by running the following command:
@@ -318,7 +318,7 @@ $ helm delete -n csi-secrets-store csi-secrets-store-driver
318318
[source,terminal]
319319
----
320320
$ oc adm policy remove-scc-from-user privileged \
321-
system:serviceaccount:csi-secrets-store:secrets-store-csi-driver; $ oc adm policy remove-scc-from-user privileged \
321+
system:serviceaccount:csi-secrets-store:secrets-store-csi-driver; oc adm policy remove-scc-from-user privileged \
322322
system:serviceaccount:csi-secrets-store:csi-secrets-store-provider-aws
323323
----
324324

@@ -335,7 +335,7 @@ https://raw.githubusercontent.com/rh-mobb/documentation/main/content/misc/secret
335335
[source,terminal]
336336
----
337337
$ aws iam detach-role-policy --role-name openshift-access-to-mysecret \
338-
--policy-arn $POLICY_ARN; $ aws iam delete-role --role-name openshift-access-to-mysecret; $ aws iam delete-policy --policy-arn $POLICY_ARN
338+
--policy-arn $POLICY_ARN; aws iam delete-role --role-name openshift-access-to-mysecret; aws iam delete-policy --policy-arn $POLICY_ARN
339339
----
340340

341341
. Delete the Secrets Manager secret by running the following command:

0 commit comments

Comments
 (0)