You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
While you can avoid setting aws.accountId if you want .. it breaks the code behavior when it comes time to attach a new policy to a role or create a role. This is because you craft the ARNs in-code, and you need the Account ID for this.
What happened:
I initially left aws.accountId unset. However then new CreateRole calls were failing. When I dug in, it was because the permissions boundary ARN was being incorrectly created. Here is a snippet of the cloudtrail log:
Is this a BUG REPORT or FEATURE REQUEST?:
While you can avoid setting
aws.accountId
if you want .. it breaks the code behavior when it comes time to attach a new policy to a role or create a role. This is because you craft the ARNs in-code, and you need the Account ID for this.What happened:
I initially left
aws.accountId
unset. However then newCreateRole
calls were failing. When I dug in, it was because the permissions boundary ARN was being incorrectly created. Here is a snippet of the cloudtrail log:What you expected to happen:
The code would auto-detect the account ID.
How to reproduce it (as minimally and precisely as possible):
Leave this setting unset. Create a role. Check your CloudTrail logs when things fail.
The text was updated successfully, but these errors were encountered: