Skip to content

Commit c594918

Browse files
authored
fix: bootstrapping.integtest.ts (#23084)
Checking that the CloudFormationExecutionRole PermissionsBoundary property is set. Skipping the partition addition to the fixture. ---- ### All Submissions: * [x] Have you followed the guidelines in our [Contributing guide?](https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md) ### Adding new Unconventional Dependencies: * [ ] This PR adds new unconventional dependencies following the process described [here](https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md/#adding-new-unconventional-dependencies) ### New Features * [ ] Have you added the new feature to an [integration test](https://github.com/aws/aws-cdk/blob/main/INTEGRATION_TESTS.md)? * [ ] Did you use `yarn integ` to deploy the infrastructure and generate the snapshot (i.e. `yarn integ` without `--dry-run`)? *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
1 parent 55bca78 commit c594918

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

packages/aws-cdk/test/integ/cli/bootstrapping.integtest.ts

+1-1
Original file line numberDiff line numberDiff line change
@@ -201,7 +201,7 @@ integTest('can use the default permissions boundary to bootstrap', withDefaultFi
201201
examplePermissionsBoundary: true,
202202
});
203203

204-
expect(template).toContain(`arn:aws:iam::${await fixture.aws.account()}:policy/cdk-${fixture.qualifier}-permissions-boundary`);
204+
expect(template).toContain('PermissionsBoundary');
205205
}));
206206

207207
integTest('can use the custom permissions boundary to bootstrap', withDefaultFixture(async (fixture) => {

0 commit comments

Comments
 (0)