Skip to content

Commit 618ceb1

Browse files
committed
test: update aks federated-credential command to add --audiences
az version 2.74+ requires audiences flag to be explicitly set with 1 audience. Signed-off-by: Anish Ramasekar <[email protected]>
1 parent e1077c0 commit 618ceb1

File tree

1 file changed

+6
-3
lines changed

1 file changed

+6
-3
lines changed

test/scripts/run-e2e-azure.sh

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -97,21 +97,24 @@ main() {
9797
--identity-name "${user_assigned_identity_name}" \
9898
--resource-group "${CLUSTER_NAME}" \
9999
--issuer "${AKS_CLUSTER_OIDC_ISSUER_URL}" \
100-
--subject "system:serviceaccount:default:default" > /dev/null
100+
--subject "system:serviceaccount:default:default" \
101+
--audiences api://AzureADTokenExchange > /dev/null
101102

102103
echo "Creating federated identity credential for test-ns:default"
103104
az identity federated-credential create --name "kubernetes-federated-credential-test-ns" \
104105
--identity-name "${user_assigned_identity_name}" \
105106
--resource-group "${CLUSTER_NAME}" \
106107
--issuer "${AKS_CLUSTER_OIDC_ISSUER_URL}" \
107-
--subject "system:serviceaccount:test-ns:default" > /dev/null
108+
--subject "system:serviceaccount:test-ns:default" \
109+
--audiences api://AzureADTokenExchange > /dev/null
108110

109111
echo "Creating federated identity credential for negative-test-ns:default"
110112
az identity federated-credential create --name "kubernetes-federated-credential-negative-test-ns" \
111113
--identity-name "${user_assigned_identity_name}" \
112114
--resource-group "${CLUSTER_NAME}" \
113115
--issuer "${AKS_CLUSTER_OIDC_ISSUER_URL}" \
114-
--subject "system:serviceaccount:negative-test-ns:default" > /dev/null
116+
--subject "system:serviceaccount:negative-test-ns:default" \
117+
--audiences api://AzureADTokenExchange > /dev/null
115118

116119
# Assigning the managed identity the necessary permissions to access the keyvault
117120
echo "Assigning managed identity permissions to get secrets from keyvault"

0 commit comments

Comments
 (0)