@@ -70,9 +70,9 @@ func syncProviderAccessStatus(ctx context.Context, customContext *workflow.Conte
7070func tryToAuthorize (ctx context.Context , access mongodbatlas.CloudProviderAccessService , logger * zap.SugaredLogger , statusMap map [v1.CloudProviderAccessRole ]status.CloudProviderAccessRole , groupID string ) {
7171 for spec , roleStatus := range statusMap {
7272 if roleStatus .Status == status .StatusCreated {
73- request := mongodbatlas.CloudProviderAuthorizationRequest {
73+ request := mongodbatlas.CloudProviderAccessRoleRequest {
7474 ProviderName : spec .ProviderName ,
75- IAMAssumedRoleARN : spec .IamAssumedRoleArn ,
75+ IAMAssumedRoleARN : & spec .IamAssumedRoleArn ,
7676 }
7777 role , _ , err := access .AuthorizeRole (ctx , groupID , roleStatus .RoleID , & request )
7878 if err != nil {
@@ -109,7 +109,7 @@ func ensureCloudProviderAccessStatus(statusMap map[v1.CloudProviderAccessRole]st
109109 return workflow .OK (), status .CloudProviderAccessReadyType
110110}
111111
112- func updateAccessRoles (toUpdate []mongodbatlas.AWSIAMRole , specToStatus map [v1.CloudProviderAccessRole ]status.CloudProviderAccessRole ) {
112+ func updateAccessRoles (toUpdate []mongodbatlas.CloudProviderAccessRole , specToStatus map [v1.CloudProviderAccessRole ]status.CloudProviderAccessRole ) {
113113 for _ , role := range toUpdate {
114114 for spec , roleStatus := range specToStatus {
115115 if role .RoleID == roleStatus .RoleID {
@@ -212,7 +212,7 @@ func checkStatuses(specs []v1.CloudProviderAccessRole, statuses []status.CloudPr
212212
213213type accessRoleDiff struct {
214214 toCreate []v1.CloudProviderAccessRole
215- toUpdate []mongodbatlas.AWSIAMRole
215+ toUpdate []mongodbatlas.CloudProviderAccessRole
216216 toDelete map [string ]string // roleId -> providerName
217217}
218218
0 commit comments