@@ -112,10 +112,10 @@ $ rosa describe cluster \
112112+
113113[source,terminal]
114114----
115- $ aws iam create-role \
115+ ROLE_ARN=$( aws iam create-role \
116116 --role-name "<your_cluster_name>-aws-efs-csi-operator" \
117117 --assume-role-policy-document file://<your_trust_file_name>.json \
118- --query "Role.Arn" --output text
118+ --query "Role.Arn" --output text); echo $ROLE_ARN
119119----
120120+
121121Save the output. You will use it in the next steps.
@@ -124,27 +124,22 @@ Save the output. You will use it in the next steps.
124124+
125125[source,terminal]
126126----
127- $ aws iam create-policy \
127+ POLICY_ARN=$( aws iam create-policy \
128128 --policy-name "<your_rosa_cluster_name>-rosa-efs-csi" \
129129 --policy-document file://<your_policy_file_name>.json \
130- --query 'Policy.Arn' --output text) || \
131- POLICY=$(aws iam list-policies \
132- --query 'Policies[?PolicyName==`rosa-efs-csi`].Arn' \
133- --output text
130+ --query 'Policy.Arn' --output text); echo $POLICY_ARN
134131----
135132+
136- Save the output. You will use it in the next steps.
137133
138134.. Attach the IAM policy to the IAM role:
139135+
140136[source,terminal]
141137----
142138$ aws iam attach-role-policy \
143- --role-name "<your_rosa_cluster_name>-aws-efs-csi-operator" \
144- --policy-arn <policy_ARN> <1>
139+ --role-name "<your_rosa_cluster_name>-aws-efs-csi-operator" \
140+ --policy-arn $POLICY_ARN
145141----
146142+
147- <1> Replace `policy_ARN` with the output you saved while creating the policy.
148143
149144. Create a `Secret` YAML file for the driver operator:
150145+
0 commit comments