Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

allow use of privileged session #36

Merged
merged 3 commits into from
Mar 24, 2021
Merged

Conversation

mcalhoun
Copy link
Collaborator

@mcalhoun mcalhoun commented Mar 23, 2021

what

Allow use of the current session in the aws delete-default-vpcs command via the --privileged flag rather than specifying a role ARN

why

When using an IAM user or AWS SSO, the user can run with the currently exported credentials (or specify a profile) rather than a role ARN. In the following example, the user would be deleting all the VPCs in the security account:

$ AWS_PROFILE=acme-gbl-security-admin turf aws delete-default-vpcs --privileged --delete

@mcalhoun mcalhoun merged commit 97fd006 into master Mar 24, 2021
@mcalhoun mcalhoun deleted the chore/allow-use-privileged-session branch March 24, 2021 13:41
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants