Replies: 1 comment
-
It's commented in the code: But... I would also prefer to have option to disable that behaviour. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I'm getting a log message that says
current credentials could not be used to assume 'arn:aws:iam::########:role/cdk-qualifier-file-publishing-role-########-us-east-1', but are for the right account. Proceeding anyway.
It seems wrong that the CDK creates special roles to control what can be done on deploys but then ignores the fact that it can't assume those roles when run. Why doesn't it fail with an error? And why doesn't the
--strict
mode flag cause that at the very least?Beta Was this translation helpful? Give feedback.
All reactions