From ca6eb5291b1ae8abd446659a23a5f6c2df203e5f Mon Sep 17 00:00:00 2001 From: Nick Burgan <122842472+nb1701@users.noreply.github.com> Date: Mon, 15 Apr 2024 12:35:25 -0700 Subject: [PATCH] Update nuke.yaml (#309) --- e2e-test/nuke.yaml | 22 ++++++++++++++++------ 1 file changed, 16 insertions(+), 6 deletions(-) diff --git a/e2e-test/nuke.yaml b/e2e-test/nuke.yaml index 5fc57558..a3d4e696 100644 --- a/e2e-test/nuke.yaml +++ b/e2e-test/nuke.yaml @@ -14,16 +14,20 @@ accounts: "296877675213": # civiform-deploy-e2e-tests AWS account. filters: ACMCertificate: - - property: "DomainName" - value: "civiform-deploy-e2e-tests.civiform.dev" + - type: glob + property: "DomainName" + value: "*.civiform.dev" IAMOpenIDConnectProvider: - - type: contains - value: "oidc-provider/token.actions.githubusercontent.com" + - type: glob + value: "arn:aws:iam::*:oidc-provider/token.actions.githubusercontent.com" IAMRole: - "OrganizationAccountAccessRole" - "e2e-test-runner" - property: "Name" regex: "^AWSReservedSSO_.+$" + - property: "Name" + type: glob + value: "*-deploy-action" IAMRolePolicy: - property: "Name" regex: "^AWSReservedSSO_.+$" @@ -32,9 +36,15 @@ accounts: - "e2e-test-runner -> AdministratorAccess" - property: "RoleName" regex: "^AWSReservedSSO_.+$" + - property: "RoleName" + type: glob + value: "*-deploy-action" + IAMSAMLProvider: + - type: glob + value: "arn:aws:iam::*:saml-provider/AWSSSO_*" OpsWorksUserProfile: - - type: contains - value: "arn:aws:sts::296877675213:assumed-role" + - type: glob + value: "arn:aws:sts::*:assumed-role/OrganizationAccountAccessRole/*" OSPackage: - property: "PackageName" type: regex