Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Provider does not destroy IAM roles and subsequent runs result in broken Federated OIDC provider configurations #800

Open
InfoSec812 opened this issue Sep 25, 2024 · 0 comments

Comments

@InfoSec812
Copy link

I recently created/destroyed a cluster several times to test the terraform manifests we are using. The first cluster seemed to work OK, but we needed to change some things and test again... Subsequent runs of the provider resulted in clusters which were not very functional in multiple ways and this morning I discovered that all of the Federated roles in IAM for that cluster were referring to an OIDC identity provider which no longer exists!

I re-ran my destroy and discovered that the IAM roles are not being destroyed/deleted, and so when I run a new apply command it skips creating/updating those resources and builds a cluster which is somewhat non-functional.

IMHO, the rhcs provider (or the underlying AWS providers) should destroy those roles or at the very least update them when creating a new cluster with the same name/tags.

@InfoSec812 InfoSec812 changed the title Provider does not destroy IAM roles and subsequent runs result in borken Federated OIDC provider configurations Provider does not destroy IAM roles and subsequent runs result in broken Federated OIDC provider configurations Sep 25, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant