-
Notifications
You must be signed in to change notification settings - Fork 323
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
kube2iam should discover AWS account ID #13
Comments
I don't think this should be the default behaviour but maybe if a |
Can use the api call on sts to fetch this.
Would be awesome to add this. |
@jtblin That's just the default base ARN at which a role will be located if it's not explicitly put into any path. |
I don't think we'd want to set the default role automatically from a security standpoint, maybe we could do that with (yet) another flag e.g. |
Now released as |
If no
base-role
is set, kube2iam should probably discover the AWS account ID and usearn:aws:iam::${AWS_ACCOUNT_ID}:role/
as the default.The text was updated successfully, but these errors were encountered: