-
Notifications
You must be signed in to change notification settings - Fork 4.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(cli): unable to set termination protection for pipeline stacks #9938
Conversation
As far as I can determine, there are no tests for the bootstrap stack template. Presumably this would mean that in this case the failed PR Linter check should be ignored? |
@rix0rrr: Sorry to trouble you directly (and I chose you simply because you're a recent committer!), but I suspect this PR may be languishing because of the failed PR Linter check which, as I mentioned above, seems to be inappropriate here because as far as I can tell there are no tests for the bootstrap template. Would you be able to have a look and advise if there's anything more I need to do? Thanks. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
changes look fine. have you run the integ tests yarn integ-cli
or npm run integ-cli
there are some bootstrap integration tests that will can be executed. The tests can be found here
Thanks for your reply, @shivlaks. I had been looking (fruitlessly, of course) for tests that check the actual deployed bootstrap resources. The CLI integration tests do pass.
|
Add `cloudformation:UpdateTerminationProtection` permission to the pipeline deployment role so that termination protection can be enabled for stacks deployed from pipelines.
Pull request has been modified.
Updated to current |
Hello @shivlaks. Is there anything more I can (or need to) do to get this PR merged? |
Thank you for contributing! Your pull request will be updated from master and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork). |
@williterate approved! sorry for the delay. I wanted to sync with @rix0rrr to make sure he was good with it. |
AWS CodeBuild CI Report
Powered by github-codebuild-logs, available on the AWS Serverless Application Repository |
Thank you for contributing! Your pull request will be updated from master and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork). |
Add
cloudformation:UpdateTerminationProtection
permission to the pipeline deployment role so that termination protection can be enabled for pipeline stacks.Currently, creating a pipeline stack with termination protection set to true causes an error:
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license