Skip to content
This repository was archived by the owner on Jan 14, 2025. It is now read-only.

Commit c167be5

Browse files
committed
fixed typo for Node 10 and IAM policy name
1 parent fef443e commit c167be5

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

Auth/0_GettingStarted/README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -92,11 +92,11 @@ Keep your AWS Cloud9 IDE opened in a tab throughout this workshop as you'll be u
9292

9393
### Initialize your developer workspace
9494

95-
1. Run the following commands to upgrade your Node.js version to the latest version of Node.js 8. The [AWS Amplify](https://aws-amplify.github.io/) JavaScript library which we will be using requires Node.js 8 or higher.
95+
1. Run the following commands to upgrade your Node.js version to the latest version of Node.js 10. The [AWS Amplify](https://aws-amplify.github.io/) JavaScript library which we will be using requires Node.js 10 or higher.
9696

9797
```console
98-
nvm i 8
99-
nvm alias default 8
98+
nvm i 10
99+
nvm alias default 10
100100
```
101101

102102
2. Install the yarn package manager and website dependencies by running the following commands

Auth/2_ServerlessAPI/Optional-APIGateway-IAMAuth.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -58,13 +58,13 @@ In the IAM console, assocate the *WildRydesAPI-StandardUserPolicy* with your Cog
5858

5959
1. Choose **Attach policies**.
6060

61-
1. Search for `WildRydes` and check the box next to the policy named *WildRydesAPI-StandardUserAccess*.
61+
1. Search for `WildRydes` and check the box next to the policy named *WildRydesAPI-StandardUserPolicy*.
6262

6363
![Attach API Gateway IAM Policy](../images/iam-cognito-authrole-attach-apigateway-policy.png)
6464

6565
1. Choose **Attach policy**.
6666

67-
1. You should now see the *WildRydesAPI-StandardUserAccess* policy associated with your Cognito IAM auth role.
67+
1. You should now see the *WildRydesAPI-StandardUserPolicy* policy associated with your Cognito IAM auth role.
6868

6969
![Permissions after adding IAM policy](../images/iam-cognito-authrole-permissions-after-policy-update.png)
7070

@@ -156,4 +156,4 @@ Now that you've deployed the new authorizer configuration to production, all API
156156
</p></details>
157157
<br>
158158
159-
If your API now invokes correctly and application funcions as expected summoning unicorns again, you can proceed to the next module, [IAM-based Authorization](../3_IAMAuthorization).
159+
If your API now invokes correctly and application functions as expected summoning unicorns again, you can proceed to the next module, [IAM-based Authorization](../3_IAMAuthorization).

0 commit comments

Comments
 (0)