You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -878,13 +871,6 @@ written to a file called `cdk.context.json`.
878
871
You must commit this file to source control so that the lookup values are available in non-privileged
879
872
environments such as CI build steps, and to ensure your template builds are repeatable.
880
873
881
-
To customize the cache key, use the `additionalCacheKey` property of the `options` parameter.
882
-
This allows you to have multiple lookups with the same parameters
883
-
cache their values separately. This can be useful if you want to
884
-
scope the context variable to a construct (ie, using `additionalCacheKey: this.node.path`),
885
-
so that if the value in the cache needs to be updated, it does not need to be updated
886
-
for all constructs at the same time.
887
-
888
874
### Cross Stack Connections
889
875
890
876
If you are attempting to add a connection from a peer in one stack to a peer in a different stack, sometimes it is necessary to ensure that you are making the connection in
// In the case of "allowAllOutbound", we don't add any more rules. There
558
553
// is only one rule which allows all traffic and that subsumes any other
559
554
// rule.
560
-
if(!remoteRule){// Warn only if addEgressRule() was explicitly called
555
+
if(!remoteRule){// Warn only if addEgressRule() was explicitely called
561
556
Annotations.of(this).addWarningV2('@aws-cdk/aws-ec2:ipv4IgnoreEgressRule','Ignoring Egress rule since \'allowAllOutbound\' is set to true; To add customized rules, set allowAllOutbound=false on the SecurityGroup');
562
557
}
563
558
return;
@@ -572,7 +567,7 @@ export class SecurityGroup extends SecurityGroupBase {
572
567
// In the case of "allowAllIpv6Outbound", we don't add any more rules. There
573
568
// is only one rule which allows all traffic and that subsumes any other
574
569
// rule.
575
-
if(!remoteRule){// Warn only if addEgressRule() was explicitly called
570
+
if(!remoteRule){// Warn only if addEgressRule() was explicitely called
576
571
Annotations.of(this).addWarningV2('@aws-cdk/aws-ec2:ipv6IgnoreEgressRule','Ignoring Egress rule since \'allowAllIpv6Outbound\' is set to true; To add customized rules, set allowAllIpv6Outbound=false on the SecurityGroup');
577
572
}
578
573
return;
@@ -599,7 +594,7 @@ export class SecurityGroup extends SecurityGroupBase {
599
594
// to "allOutbound=true" mode, because we might have already emitted
600
595
// EgressRule objects (which count as rules added later) and there's no way
601
596
// to recall those. Better to prevent this for now.
602
-
thrownewValidationError('Cannot add an "all traffic" egress rule in this way; set allowAllOutbound=true (for ipv6) or allowAllIpv6Outbound=true (for ipv6) on the SecurityGroup instead.',this);
597
+
thrownewError('Cannot add an "all traffic" egress rule in this way; set allowAllOutbound=true (for ipv6) or allowAllIpv6Outbound=true (for ipv6) on the SecurityGroup instead.');
603
598
}
604
599
605
600
this.addDirectEgressRule(rule);
@@ -658,7 +653,7 @@ export class SecurityGroup extends SecurityGroupBase {
0 commit comments