Skip to content
#

cloudformation

Here are 1,206 public repositories matching this topic...

scar
cloudkj
cloudkj commented Jun 4, 2019

As per https://docs.aws.amazon.com/acm/latest/userguide/acm-regions.html, ACM has a restriction that requires certificates to be created in the us-east-1 region in order to be used with CloudFront:

To use an ACM Certificate with Amazon CloudFront, you must request or import the certificate in the US East (N. Virginia) region. ACM Certificates in this region that are associated with a CloudFr

cfn-python-lint
kylelaker
kylelaker commented Dec 18, 2019

cfn-lint version: (cfn-lint --version): cfn-lint 0.26.0

Description of issue.

It'd be helpful if cfn-lint had a check when parameter names or psuedo-parameters are used in conditions without a !Ref much like it checks for strings with ${PARAMETER} without a !Sub. This would prevent accidental comparisons with a string literal. It might also be helpful to check for conditions that

alexharv074
alexharv074 commented Dec 8, 2019

I can see some basic support in Sceptre for AWS SAM although there don't appear to be any code examples or blog posts and it's unclear to me how you would actually do SAM in Sceptre, especially after SAM's guided deploy mode became the standard.

In the mean time, can anyone suggest the high level approach- would I create a Python wrapper to call the SAM CLI to do sam build and sam package a

ceich
ceich commented Jan 31, 2019

Describe the bug
Several of the screens in the Cognito User Pool console (post-creation) are not captured.

To Reproduce
Steps to reproduce the behavior:

  1. Go to 'Cognito User Pools' in the console.
  2. Click on an existing User Pool with an App Client.
  3. Scroll down to 'Federation' and fill out the two pages, e.g. for Google.
  4. Scroll up to 'App Integration' and fill out the App
timbaileyjones
timbaileyjones commented Aug 12, 2019

While testing another PR, I found that mu pipeline logs command displays information from the pipelines, but also shows this error:

$ mu pipeline logs
[... normal, expected output ...]
func1 ▶ ERROR  ResourceNotFoundException: The specified log group does not exist.
	status code: 400, request id: f7260741-7f69-4772-b4cc-7c6a9c22d264

This error does not occur with the `-f

aws-cloudformation-coverage-roadmap
taskcat
ctnieves
ctnieves commented Dec 3, 2019

Currently the generated output is

type GraphQLApi_AdditionalAuthenticationProviders struct {

	// AWSCloudFormationDeletionPolicy represents a CloudFormation DeletionPolicy
	AWSCloudFormationDeletionPolicy policies.DeletionPolicy `json:"-"`

	// AWSCloudFormationDependsOn stores the logical ID of the resources to be created before this resource
	AWSCloudFormationDependsOn []string `js
CelticRugger
CelticRugger commented Jul 14, 2018

*******************>>> should be on
$(document).one('receivelexconfig', function onReceiveLexConfig() {
var localTimeZone;
try {
localTimeZone = JSON.stringify(
Intl.DateTimeFormat().resolvedOptions().timeZone
);
} catch (err) {
localTimeZone = JSON.stringify(
new Date().getTimezoneOffse

aws-bootstrap
digitalbreed
digitalbreed commented Jan 22, 2020

On page 106, in the main.yml example, there are two lines annotated with number (1).

The first description for (1) says "The WaitOnResourceSignal works for ASGs in the same way that the CreationPolicy worked on individual instances."; I believe it should be "The UpdatePolicy works..."

The actual "WaitOnResourceSignals" parameter, which is also annotated with (1), is not documented at all.

tmaas22
tmaas22 commented Jul 23, 2018

Issue: not enough documentation for arguments to pass into cfnCreateChangeSet

I'm trying to create a wrapper around the cfnCreateChangeSet but have had to spend quite a bit of time experimenting with options of "What-ifs" on whether I need to validate input parameters or if this will do all of the work for me.

Biggest problem I've found is the absence of documentation on the differe

Improve this page

Add a description, image, and links to the cloudformation topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the cloudformation topic, visit your repo's landing page and select "manage topics."

Learn more

You can’t perform that action at this time.