Skip to content

Commit e673854

Browse files
authored
Fix on script with PIA role teardown (#524)
1 parent 27a3144 commit e673854

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

tests/tekton-resources/tasks/teardown/awscli-eks.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,13 +53,13 @@ spec:
5353
if [ "$PIA_ROLE_EXISTS" == "$PIA_ROLE_NAME" ]; then
5454
# Detach all attached managed policies
5555
aws iam list-attached-role-policies --role-name "$PIA_ROLE_NAME" \
56-
--query 'AttachedPolicies[*].PolicyArn' --output text | while read -r policy_arn; do
56+
--query 'AttachedPolicies[*].PolicyArn' --output json | jq -r '.[]' | while read -r policy_arn; do
5757
echo "Detaching managed policy: $policy_arn"
5858
aws iam detach-role-policy --role-name "$PIA_ROLE_NAME" --policy-arn "$policy_arn"
5959
done
6060
# Delete all inline policies
6161
aws iam list-role-policies --role-name "$PIA_ROLE_NAME" \
62-
--query 'PolicyNames' --output text | while read -r policy_name; do
62+
--query 'PolicyNames' --output json | jq -r '.[]' | while read -r policy_name; do
6363
echo "Deleting inline policy: $policy_name"
6464
aws iam delete-role-policy --role-name "$PIA_ROLE_NAME" --policy-name "$policy_name"
6565
done

0 commit comments

Comments
 (0)