File tree Expand file tree Collapse file tree 1 file changed +1
-6
lines changed
pkg/cloud/services/iamauth Expand file tree Collapse file tree 1 file changed +1
-6
lines changed Original file line number Diff line number Diff line change @@ -30,7 +30,6 @@ import (
30
30
infrav1 "sigs.k8s.io/cluster-api-provider-aws/v2/api/v1beta2"
31
31
ekscontrolplanev1 "sigs.k8s.io/cluster-api-provider-aws/v2/controlplane/eks/api/v1beta2"
32
32
expinfrav1 "sigs.k8s.io/cluster-api-provider-aws/v2/exp/api/v1beta2"
33
- iamv1 "sigs.k8s.io/cluster-api-provider-aws/v2/iam/api/v1beta1"
34
33
clusterv1 "sigs.k8s.io/cluster-api/api/v1beta1"
35
34
expclusterv1 "sigs.k8s.io/cluster-api/exp/api/v1beta1"
36
35
)
@@ -105,11 +104,7 @@ func (s *Service) getARNForRole(role string) (string, error) {
105
104
}
106
105
107
106
func (s * Service ) getRolesForWorkers (ctx context.Context ) (map [string ]struct {}, error ) {
108
- // previously this was the default role always added to the IAM authenticator config
109
- // we'll keep this to not break existing behavior for users
110
- allRoles := map [string ]struct {}{
111
- fmt .Sprintf ("nodes%s" , iamv1 .DefaultNameSuffix ): {},
112
- }
107
+ allRoles := map [string ]struct {}{}
113
108
if err := s .getRolesForMachineDeployments (ctx , allRoles ); err != nil {
114
109
return nil , fmt .Errorf ("failed to get roles from machine deployments %w" , err )
115
110
}
You can’t perform that action at this time.
0 commit comments