Skip to content

Commit 7a97a39

Browse files
Merging divergent mainline branches.
2 parents ff920de + 1c53b57 commit 7a97a39

File tree

6 files changed

+17
-14
lines changed

6 files changed

+17
-14
lines changed

v2/guide/attributes.txt

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,3 +2,6 @@
22
:arn-aws: pass:q[[.shared]``region.arn``]
33
:aws: pass:q[[.shared]``AWS``]
44
:aws-management-console: pass:q[[.shared]``consolelong``]
5+
6+
:tcx5-2025-waiver: pass:[ ]
7+

v2/guide/best-practices-security.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ To configure the IAM identities in your {aws} account with permission to assume
5252
[source,json,subs="verbatim,attributes"]
5353
----
5454
{
55-
"Version": "2012-10-17",
55+
"Version": "2012-10-17",{tcx5-2025-waiver}
5656
"Statement": [{
5757
"Sid": "AssumeCDKRoles",
5858
"Effect": "Allow",
@@ -130,4 +130,4 @@ If you want to work around this feature by replacing the automatically generated
130130
* A common workaround to using wildcards is to mandate that all resources be given a predictable name. However, this interferes with CloudFormation`'s ability to replace resources when necessary and may slow down or block development. Because of this, we recommend that you allow CloudFormation to create unique resource names for you.
131131
* It will be impossible to perform continuous delivery since manual actions must be performed prior to every deployment.
132132
133-
When organizations want to prevent the CDK from creating roles, it is usually to prevent developers from being able to create IAM roles. The concern is that by giving developers permission to create IAM roles using the {aws} CDK, they could possibly elevate their own privileges. To mitigate against this, we recommend using _permission boundaries_ or _service control policies (SCPs)_. With permission boundaries, you can set limits for what developers and the CDK are allowed to do. For more information on using permission boundaries with the CDK, see xref:customize-permissions-boundaries[Create and apply permissions boundaries for the {aws} CDK].
133+
When organizations want to prevent the CDK from creating roles, it is usually to prevent developers from being able to create IAM roles. The concern is that by giving developers permission to create IAM roles using the {aws} CDK, they could possibly elevate their own privileges. To mitigate against this, we recommend using _permission boundaries_ or _service control policies (SCPs)_. With permission boundaries, you can set limits for what developers and the CDK are allowed to do. For more information on using permission boundaries with the CDK, see xref:customize-permissions-boundaries[Create and apply permissions boundaries for the {aws} CDK].

v2/guide/bootstrapping-env.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -257,7 +257,7 @@ When bootstrapping an {aws} environment, the IAM identity performing the bootstr
257257
[source,json,subs="verbatim,attributes"]
258258
----
259259
{
260-
"Version": "2012-10-17",
260+
"Version": "2012-10-17",{tcx5-2025-waiver}
261261
"Statement": [
262262
{
263263
"Effect": "Allow",

v2/guide/hello-world.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1176,7 +1176,7 @@ Resources:
11761176
Effect: Allow
11771177
Principal:
11781178
Service: lambda.amazonaws.com
1179-
Version: "2012-10-17"
1179+
Version: "2012-10-17"{tcx5-2025-waiver}
11801180
ManagedPolicyArns:
11811181
- Fn::Join:
11821182
- ""
@@ -1662,4 +1662,4 @@ For additional resources, see the following:
16621662
* Visit https://constructs.dev/search?q=&cdk=aws-cdk&cdkver=2&sort=downloadsDesc&offset=0[Construct Hub] to discover constructs created by {aws} and others.
16631663
* Explore https://github.com/aws-samples/aws-cdk-examples[Examples] of using the {aws} CDK.
16641664
1665-
The {aws} CDK is an open-source project. To contribute, see to https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md[Contributing to the {aws} Cloud Development Kit ({aws} CDK)].
1665+
The {aws} CDK is an open-source project. To contribute, see to https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md[Contributing to the {aws} Cloud Development Kit ({aws} CDK)].

v2/guide/serverless_example.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1191,7 +1191,7 @@ Resources:
11911191
Effect: Allow
11921192
Principal:
11931193
Service: lambda.amazonaws.com
1194-
Version: "2012-10-17"
1194+
Version: "2012-10-17"{tcx5-2025-waiver}
11951195
ManagedPolicyArns:
11961196
- Fn::Join:
11971197
- ""
@@ -1596,4 +1596,4 @@ $ aws lambda invoke --function-name CdkHelloWorldStack-HelloWorldFunctionunique-
15961596
If `output.txt` shows a successful Lambda function response, the issue could be with how you defined your API Gateway REST API. The {aws} CLI invokes your Lambda directly, not through your endpoint. Check your code to ensure it matches this tutorial. Then, deploy again.
15971597
+
15981598
*Possible cause: Lambda resource is defined incorrectly in your stack file*:::
1599-
If `output.txt` returns an error, the issue could be with how you defined your Lambda function. Check your code to ensure it matches this tutorial. Then deploy again.
1599+
If `output.txt` returns an error, the issue could be with how you defined your Lambda function. Check your code to ensure it matches this tutorial. Then deploy again.

v2/guide/testing.adoc

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -869,7 +869,7 @@ TypeScript::
869869
"{aws}::IAM::Role",
870870
Match.objectEquals({
871871
AssumeRolePolicyDocument: {
872-
Version: "2012-10-17",
872+
Version: "2012-10-17",{tcx5-2025-waiver}
873873
Statement: [
874874
{
875875
Action: "sts:AssumeRole",
@@ -898,7 +898,7 @@ JavaScript::
898898
"{aws}::IAM::Role",
899899
Match.objectEquals({
900900
AssumeRolePolicyDocument: {
901-
Version: "2012-10-17",
901+
Version: "2012-10-17",{tcx5-2025-waiver}
902902
Statement: [
903903
{
904904
Action: "sts:AssumeRole",
@@ -930,7 +930,7 @@ from aws_cdk.assertions import Match
930930
Match.object_equals(
931931
{
932932
"AssumeRolePolicyDocument": {
933-
"Version": "2012-10-17",
933+
"Version": "2012-10-17",{tcx5-2025-waiver}
934934
"Statement": [
935935
{
936936
"Action": "sts:AssumeRole",
@@ -962,7 +962,7 @@ Java::
962962
// Fully assert on the state machine's IAM role with matchers.
963963
template.hasResourceProperties("{aws}::IAM::Role", Match.objectEquals(
964964
Collections.singletonMap("AssumeRolePolicyDocument", Map.of(
965-
"Version", "2012-10-17",
965+
"Version", "2012-10-17",{tcx5-2025-waiver}
966966
"Statement", Collections.singletonList(Map.of(
967967
"Action", "sts:AssumeRole",
968968
"Effect", "Allow",
@@ -988,11 +988,11 @@ C#::
988988
{
989989
{ "AssumeRolePolicyDocument", new ObjectDict
990990
{
991-
{ "Version", "2012-10-17" },
991+
{ "Version", "2012-10-17"{tcx5-2025-waiver} },
992992
{ "Action", "sts:AssumeRole" },
993993
{ "Principal", new ObjectDict
994994
{
995-
{ "Version", "2012-10-17" },
995+
{ "Version", "2012-10-17"{tcx5-2025-waiver} },
996996
{ "Statement", new object[]
997997
{
998998
new ObjectDict {
@@ -1551,4 +1551,4 @@ Don't copy and paste setup lines or common assertions. Instead, refactor this lo
15511551
15521552
Don't try to do too much in one test. Preferably, a test should test one and only one behavior. If you accidentally break that behavior, exactly one test should fail, and the name of the test should tell you what failed. This is more an ideal to be striven for, however; sometimes you will unavoidably (or inadvertently) write tests that test more than one behavior. Snapshot tests are, for reasons we've already described, especially prone to this problem, so use them sparingly.
15531553
1554-
include::testing-locally.adoc[leveloffset=+1]
1554+
include::testing-locally.adoc[leveloffset=+1]

0 commit comments

Comments
 (0)