You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -150,15 +150,15 @@ The problem is caused by incorrect trust relationships linked to the role that y
150
150
Use the [execution-role.yaml](examples/execution-role.yaml) file to generate an IAM role that you can use to activate the CFN resources and run your CFN stacks.
151
151
152
152
Alternatively, you can set the trust relationships of your role via AWS Console: in the IAM dashboard, select your role and click **Trust Relationships**:
153
-

153
+

154
154
155
155
### Activate Type IAM Role deleted
156
156
The IAM Role used to Activate the resource type might have been deleted (also applies when using a different IAM Role when creating the stack).
0 commit comments