@@ -70,9 +70,9 @@ func syncProviderAccessStatus(ctx context.Context, customContext *workflow.Conte
70
70
func tryToAuthorize (ctx context.Context , access mongodbatlas.CloudProviderAccessService , logger * zap.SugaredLogger , statusMap map [v1.CloudProviderAccessRole ]status.CloudProviderAccessRole , groupID string ) {
71
71
for spec , roleStatus := range statusMap {
72
72
if roleStatus .Status == status .StatusCreated {
73
- request := mongodbatlas.CloudProviderAuthorizationRequest {
73
+ request := mongodbatlas.CloudProviderAccessRoleRequest {
74
74
ProviderName : spec .ProviderName ,
75
- IAMAssumedRoleARN : spec .IamAssumedRoleArn ,
75
+ IAMAssumedRoleARN : & spec .IamAssumedRoleArn ,
76
76
}
77
77
role , _ , err := access .AuthorizeRole (ctx , groupID , roleStatus .RoleID , & request )
78
78
if err != nil {
@@ -109,7 +109,7 @@ func ensureCloudProviderAccessStatus(statusMap map[v1.CloudProviderAccessRole]st
109
109
return workflow .OK (), status .CloudProviderAccessReadyType
110
110
}
111
111
112
- func updateAccessRoles (toUpdate []mongodbatlas.AWSIAMRole , specToStatus map [v1.CloudProviderAccessRole ]status.CloudProviderAccessRole ) {
112
+ func updateAccessRoles (toUpdate []mongodbatlas.CloudProviderAccessRole , specToStatus map [v1.CloudProviderAccessRole ]status.CloudProviderAccessRole ) {
113
113
for _ , role := range toUpdate {
114
114
for spec , roleStatus := range specToStatus {
115
115
if role .RoleID == roleStatus .RoleID {
@@ -212,7 +212,7 @@ func checkStatuses(specs []v1.CloudProviderAccessRole, statuses []status.CloudPr
212
212
213
213
type accessRoleDiff struct {
214
214
toCreate []v1.CloudProviderAccessRole
215
- toUpdate []mongodbatlas.AWSIAMRole
215
+ toUpdate []mongodbatlas.CloudProviderAccessRole
216
216
toDelete map [string ]string // roleId -> providerName
217
217
}
218
218
0 commit comments