@@ -142,7 +142,7 @@ $ oc label csidriver.storage.k8s.io/secrets-store.csi.k8s.io security.openshift.
142
142
$ SECRET_ARN=$(aws --region "$REGION" secretsmanager create-secret \
143
143
--name MySecret --secret-string \
144
144
'{"username":"shadowman", "password":"hunter2"}' \
145
- --query ARN --output text); $ echo $SECRET_ARN
145
+ --query ARN --output text); echo $SECRET_ARN
146
146
----
147
147
148
148
. Create an IAM Access Policy document by running the following command:
171
171
$ POLICY_ARN=$(aws --region "$REGION" --query Policy.Arn \
172
172
--output text iam create-policy \
173
173
--policy-name openshift-access-to-mysecret-policy \
174
- --policy-document file://policy.json); $ echo $POLICY_ARN
174
+ --policy-document file://policy.json); echo $POLICY_ARN
175
175
----
176
176
177
177
. Create an IAM Role trust policy document by running the following command:
210
210
----
211
211
$ ROLE_ARN=$(aws iam create-role --role-name openshift-access-to-mysecret \
212
212
--assume-role-policy-document file://trust-policy.json \
213
- --query Role.Arn --output text); $ echo $ROLE_ARN
213
+ --query Role.Arn --output text); echo $ROLE_ARN
214
214
----
215
215
216
216
. Attach the role to the policy by running the following command:
@@ -318,7 +318,7 @@ $ helm delete -n csi-secrets-store csi-secrets-store-driver
318
318
[source,terminal]
319
319
----
320
320
$ oc adm policy remove-scc-from-user privileged \
321
- system:serviceaccount:csi-secrets-store:secrets-store-csi-driver; $ oc adm policy remove-scc-from-user privileged \
321
+ system:serviceaccount:csi-secrets-store:secrets-store-csi-driver; oc adm policy remove-scc-from-user privileged \
322
322
system:serviceaccount:csi-secrets-store:csi-secrets-store-provider-aws
323
323
----
324
324
@@ -335,7 +335,7 @@ https://raw.githubusercontent.com/rh-mobb/documentation/main/content/misc/secret
335
335
[source,terminal]
336
336
----
337
337
$ aws iam detach-role-policy --role-name openshift-access-to-mysecret \
338
- --policy-arn $POLICY_ARN; $ aws iam delete-role --role-name openshift-access-to-mysecret; $ aws iam delete-policy --policy-arn $POLICY_ARN
338
+ --policy-arn $POLICY_ARN; aws iam delete-role --role-name openshift-access-to-mysecret; aws iam delete-policy --policy-arn $POLICY_ARN
339
339
----
340
340
341
341
. Delete the Secrets Manager secret by running the following command:
0 commit comments