Skip to content

Commit 1af9a40

Browse files
committed
add test id for controller policy name
1 parent 3c08244 commit 1af9a40

File tree

1 file changed

+10
-9
lines changed

1 file changed

+10
-9
lines changed

scripts/run-e2e-test.sh

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -29,21 +29,22 @@ function toggle_windows_scheduling(){
2929
TEST_ID=$(date +%s)
3030
echo "TEST_ID: $TEST_ID"
3131
ROLE_NAME="aws-load-balancer-controller-$TEST_ID"
32+
POLICY_NAME="AWSLoadBalancerControllerIAMPolicy-$TEST_ID"
3233

3334
function cleanUp(){
3435
# IAM role and polcies are AWS Account specific, so need to clean them up if any from previous run
35-
echo "detach IAM policy if it exists"
36-
aws iam detach-role-policy --role-name $ROLE_NAME --policy-arn arn:${AWS_PARTITION}:iam::$ACCOUNT_ID:policy/AWSLoadBalancerControllerIAMPolicy || true
36+
echo "detach IAM policy"
37+
aws iam detach-role-policy --role-name $ROLE_NAME --policy-arn arn:${AWS_PARTITION}:iam::$ACCOUNT_ID:policy/$POLICY_NAME || true
3738

3839
# wait for 10 sec to complete detaching of IAM policy
3940
sleep 10
4041

41-
echo "delete $ROLE_NAME if it exists"
42+
echo "delete $ROLE_NAME"
4243
aws iam delete-role --role-name $ROLE_NAME || true
4344

4445
# Need to do this as last step
45-
echo "delete AWSLoadBalancerControllerIAMPolicy if it exists"
46-
aws iam delete-policy --policy-arn arn:${AWS_PARTITION}:iam::$ACCOUNT_ID:policy/AWSLoadBalancerControllerIAMPolicy || true
46+
echo "delete $POLICY_NAME"
47+
aws iam delete-policy --policy-arn arn:${AWS_PARTITION}:iam::$ACCOUNT_ID:policy/$POLICY_NAME || true
4748
}
4849

4950
echo "cordon off windows nodes"
@@ -102,11 +103,11 @@ aws iam create-role --role-name $ROLE_NAME --assume-role-policy-document file://
102103

103104
echo "creating AWSLoadbalancerController IAM Policy"
104105
aws iam create-policy \
105-
--policy-name AWSLoadBalancerControllerIAMPolicy \
106+
--policy-name $POLICY_NAME \
106107
--policy-document file://"$SCRIPT_DIR"/../docs/install/${IAM_POLCIY_FILE} || true
107108

108109
echo "attaching AWSLoadBalancerController IAM Policy to $ROLE_NAME"
109-
aws iam attach-role-policy --policy-arn arn:${AWS_PARTITION}:iam::$ACCOUNT_ID:policy/AWSLoadBalancerControllerIAMPolicy --role-name $ROLE_NAME || true
110+
aws iam attach-role-policy --policy-arn arn:${AWS_PARTITION}:iam::$ACCOUNT_ID:policy/$POLICY_NAME --role-name $ROLE_NAME || true
110111

111112
echo "create service account"
112113
kubectl create serviceaccount aws-load-balancer-controller -n kube-system || true
@@ -219,9 +220,9 @@ cleanUp
219220

220221
echo "Delete CRDs if exists"
221222
if [[ $ADC_REGIONS == *"$REGION"* ]]; then
222-
kubectl delete -k "../helm/aws-load-balancer-controller/crds" --timeout=30m || true
223+
kubectl delete -k "../helm/aws-load-balancer-controller/crds" --timeout=30s || true
223224
else
224-
kubectl delete -k "github.com/aws/eks-charts/stable/aws-load-balancer-controller//crds?ref=master" --timeout=30m || true
225+
kubectl delete -k "github.com/aws/eks-charts/stable/aws-load-balancer-controller//crds?ref=master" --timeout=30s || true
225226
fi
226227

227228
if [[ "$TEST_RESULT" == fail ]]; then

0 commit comments

Comments
 (0)