Skip to content

Commit

Permalink
chore: Fix indenting on code samples
Browse files Browse the repository at this point in the history
  • Loading branch information
raykrueger committed Feb 21, 2022
1 parent 1032e88 commit 07824f2
Showing 1 changed file with 18 additions and 18 deletions.
36 changes: 18 additions & 18 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,16 +13,16 @@ CDK stack. Within the `dnsConfig` block you pass the Route 53 fully qualified
domain name, and the hosted zone ID.

```javascript
import { PublicIPSupport } from '@raykrueger/cdk-fargate-public-dns';
import { PublicIPSupport } from '@raykrueger/cdk-fargate-public-dns';

new PublicIPSupport(stack, 'PublicIPSupport', {
cluster,
service,
dnsConfig: {
domainName: 'www.example.com',
hostzedZone: 'Z0000000000000000000X',
},
})
new PublicIPSupport(stack, 'PublicIPSupport', {
cluster,
service,
dnsConfig: {
domainName: 'www.example.com',
hostzedZone: 'Z0000000000000000000X',
},
})
```

## Usage in Another Account
Expand All @@ -32,15 +32,15 @@ Construct can assume a role in that target account in order to perform the Route
53 Domain update. To do that, simply add the `assumedRole` property to the `dnsConfig`.

```javascript
new PublicIPSupport(stack, 'PublicIPSupport', {
cluster,
service,
dnsConfig: {
domainName: 'www.example.com',
hostzedZone: 'Z0000000000000000000X',
assumedRole: 'arn:aws:iam::<the_other_account_id>:role/<the_role_name_to_assume>'
},
})
new PublicIPSupport(stack, 'PublicIPSupport', {
cluster,
service,
dnsConfig: {
domainName: 'www.example.com',
hostzedZone: 'Z0000000000000000000X',
assumedRole: 'arn:aws:iam::<the_other_account_id>:role/<the_role_name_to_assume>'
},
})
```

In the target account you will need to define the role that this library can assume. You can create a role in the console to trust another AWS account. Then give it these permissions
Expand Down

0 comments on commit 07824f2

Please sign in to comment.