Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
chore(codebuild): remove deprecated Ubuntu 14.04 and Win 2016 Base images #37265
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
chore(codebuild): remove deprecated Ubuntu 14.04 and Win 2016 Base images #37265
Changes from all commits
c38f99564e9219c737775File filter
Filter by extension
Conversations
Uh oh!
There was an error while loading. Please reload this page.
Jump to
Uh oh!
There was an error while loading. Please reload this page.
There are no files selected for viewing
Check failure on line 1 in packages/@aws-cdk-testing/framework-integ/test/aws-codepipeline-actions/test/integ.pipeline-ecs-deploy.js.snapshot/aws-cdk-codepipeline-ecs-deploy.template.json
iam-no-overly-permissive-passrole.guard
Raw output
Check failure on line 1 in packages/@aws-cdk-testing/framework-integ/test/aws-codepipeline-actions/test/integ.pipeline-ecs-deploy.js.snapshot/aws-cdk-codepipeline-ecs-deploy.template.json
iam-no-overly-permissive-passrole.guard
Raw output
Check failure on line 1 in packages/@aws-cdk-testing/framework-integ/test/aws-codepipeline-actions/test/integ.pipeline-ecs-deploy.js.snapshot/aws-cdk-codepipeline-ecs-deploy.template.json
iam-role-root-principal-needs-conditions.guard
Raw output
Root principal requires a strict condition (ArnEquals or StringEquals) to scope down who can assume this role. ArnLike/StringLike are not accepted as they allow wildcards. Check was not compliant as property [Condition] is missing. Value traversed to [Path=/Resources/MyPipelineSourceCodePipelineActionRoleAA05D76F/Properties/AssumeRolePolicyDocument/Statement/0[L:538,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}]. Check was not compliant as property [Condition.ArnEquals] is missing. Value traversed to [Path=/Resources/MyPipelineSourceCodePipelineActionRoleAA05D76F/Properties/AssumeRolePolicyDocument/Statement/0[L:538,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}]. Check was not compliant as property [Condition.StringEquals] is missing. Value traversed to [Path=/Resources/MyPipelineSourceCodePipelineActionRoleAA05D76F/Properties/AssumeRolePolicyDocument/Statement/0[L:538,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}].Root principal requires a strict condition (ArnEquals or StringEquals) to scope down who can assume this role. ArnLike/StringLike are not accepted as they allow wildcards. Check was not compliant as property [Condition] is missing. Value traversed to [Path=/Resources/MyPipelineBuildCodeBuildCodePipelineActionRoleCAE538CA/Properties/AssumeRolePolicyDocument/Statement/0[L:597,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}]. Check was not compliant as property [Condition.ArnEquals] is missing. Value traversed to [Path=/Resources/MyPipelineBuildCodeBuildCodePipelineActionRoleCAE538CA/Properties/AssumeRolePolicyDocument/Statement/0[L:597,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}]. Check was not compliant as property [Condition.StringEquals] is missing. Value traversed to [Path=/Resources/MyPipelineBuildCodeBuildCodePipelineActionRoleCAE538CA/Properties/AssumeRolePolicyDocument/Statement/0[L:597,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}].Root principal requires a strict condition (ArnEquals or StringEquals) to scope down who can assume this role. ArnLike/StringLike are not accepted as they allow wildcards. Check was not compliant as property [Condition] is missing. Value traversed to [Path=/Resources/MyPipelineDeployDeployActionCodePipelineActionRole854184EF/Properties/AssumeRolePolicyDocument/Statement/0[L:637,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}]. Check was not compliant as property [Condition.ArnEquals] is missing. Value traversed to [Path=/Resources/MyPipelineDeployDeployActionCodePipelineActionRole854184EF/Properties/AssumeRolePolicyDocument/Statement/0[L:637,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}]. Check was not compliant as property [Condition.StringEquals] is missing. Value traversed to [Path=/Resources/MyPipelineDeployDeployActionCodePipelineActionRole854184EF/Properties/AssumeRolePolicyDocument/Statement/0[L:637,C:12] Value={"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789012:root"}}].Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.