You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: v2/guide/best-practices-security.adoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,7 +52,7 @@ To configure the IAM identities in your {aws} account with permission to assume
52
52
[source,json,subs="verbatim,attributes"]
53
53
----
54
54
{
55
-
"Version": "2012-10-17",
55
+
"Version": "2012-10-17",{tcx5-2025-waiver}
56
56
"Statement": [{
57
57
"Sid": "AssumeCDKRoles",
58
58
"Effect": "Allow",
@@ -130,4 +130,4 @@ If you want to work around this feature by replacing the automatically generated
130
130
* A common workaround to using wildcards is to mandate that all resources be given a predictable name. However, this interferes with CloudFormation`'s ability to replace resources when necessary and may slow down or block development. Because of this, we recommend that you allow CloudFormation to create unique resource names for you.
131
131
* It will be impossible to perform continuous delivery since manual actions must be performed prior to every deployment.
132
132
133
-
When organizations want to prevent the CDK from creating roles, it is usually to prevent developers from being able to create IAM roles. The concern is that by giving developers permission to create IAM roles using the {aws} CDK, they could possibly elevate their own privileges. To mitigate against this, we recommend using _permission boundaries_ or _service control policies (SCPs)_. With permission boundaries, you can set limits for what developers and the CDK are allowed to do. For more information on using permission boundaries with the CDK, see xref:customize-permissions-boundaries[Create and apply permissions boundaries for the {aws} CDK].
133
+
When organizations want to prevent the CDK from creating roles, it is usually to prevent developers from being able to create IAM roles. The concern is that by giving developers permission to create IAM roles using the {aws} CDK, they could possibly elevate their own privileges. To mitigate against this, we recommend using _permission boundaries_ or _service control policies (SCPs)_. With permission boundaries, you can set limits for what developers and the CDK are allowed to do. For more information on using permission boundaries with the CDK, see xref:customize-permissions-boundaries[Create and apply permissions boundaries for the {aws} CDK].
Copy file name to clipboardExpand all lines: v2/guide/hello-world.adoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1176,7 +1176,7 @@ Resources:
1176
1176
Effect: Allow
1177
1177
Principal:
1178
1178
Service: lambda.amazonaws.com
1179
-
Version: "2012-10-17"
1179
+
Version: "2012-10-17"{tcx5-2025-waiver}
1180
1180
ManagedPolicyArns:
1181
1181
- Fn::Join:
1182
1182
- ""
@@ -1662,4 +1662,4 @@ For additional resources, see the following:
1662
1662
* Visit https://constructs.dev/search?q=&cdk=aws-cdk&cdkver=2&sort=downloadsDesc&offset=0[Construct Hub] to discover constructs created by {aws} and others.
1663
1663
* Explore https://github.com/aws-samples/aws-cdk-examples[Examples] of using the {aws} CDK.
1664
1664
1665
-
The {aws} CDK is an open-source project. To contribute, see to https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md[Contributing to the {aws} Cloud Development Kit ({aws} CDK)].
1665
+
The {aws} CDK is an open-source project. To contribute, see to https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md[Contributing to the {aws} Cloud Development Kit ({aws} CDK)].
If `output.txt` shows a successful Lambda function response, the issue could be with how you defined your API Gateway REST API. The {aws} CLI invokes your Lambda directly, not through your endpoint. Check your code to ensure it matches this tutorial. Then, deploy again.
1597
1597
+
1598
1598
*Possible cause: Lambda resource is defined incorrectly in your stack file*:::
1599
-
If `output.txt` returns an error, the issue could be with how you defined your Lambda function. Check your code to ensure it matches this tutorial. Then deploy again.
1599
+
If `output.txt` returns an error, the issue could be with how you defined your Lambda function. Check your code to ensure it matches this tutorial. Then deploy again.
@@ -1551,4 +1551,4 @@ Don't copy and paste setup lines or common assertions. Instead, refactor this lo
1551
1551
1552
1552
Don't try to do too much in one test. Preferably, a test should test one and only one behavior. If you accidentally break that behavior, exactly one test should fail, and the name of the test should tell you what failed. This is more an ideal to be striven for, however; sometimes you will unavoidably (or inadvertently) write tests that test more than one behavior. Snapshot tests are, for reasons we've already described, especially prone to this problem, so use them sparingly.
0 commit comments