DevOps Engineer | @kubernetes-sigs
-
Perion Network
- Tel Aviv, Israel
-
01:15
(UTC +03:00) - omerap12@gmail.com
- in/omer-aplatony
Block or Report
Block or report omerap12
Report abuse
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abusePinned
-
K8s-Secret-Rotation-Controller
K8s-Secret-Rotation-Controller PublicAn operator designed to automate the rotation and management of secrets stored in AWS Secret Manager
Go 1
-
-
-
-
-
Remove AWS IAM Role
Remove AWS IAM Role 1role_name=$1
2aws iam list-instance-profiles-for-role --role-name $role_name | jq -r '.InstanceProfiles[].InstanceProfileName' | xargs -I {} aws iam remove-role-from-instance-profile --instance-profile-name {} --role-name $role_name
3aws iam list-role-policies --role-name $role_name | jq -r '.PolicyNames[]' | xargs -I {} aws iam delete-role-policy --role-name $role_name --policy-name {}
4aws iam list-attached-role-policies --role-name $role_name | jq -r '.AttachedPolicies[].PolicyArn' | xargs -I {} aws iam detach-role-policy --role-name $role_name --policy-arn {}
5aws iam delete-role --role-name $role_name
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.