diff --git a/packages/aws-cdk-lib/aws-ec2/lib/security-group.ts b/packages/aws-cdk-lib/aws-ec2/lib/security-group.ts index e774c1f9de3af..eb78e87afa52c 100644 --- a/packages/aws-cdk-lib/aws-ec2/lib/security-group.ts +++ b/packages/aws-cdk-lib/aws-ec2/lib/security-group.ts @@ -434,7 +434,7 @@ export class SecurityGroup extends SecurityGroupBase { * Look up a security group. */ private static fromLookupAttributes(scope: Construct, id: string, options: SecurityGroupLookupOptions) { - if (Token.isUnresolved(options.securityGroupId) || Token.isUnresolved(options.securityGroupName) || Token.isUnresolved(options.vpc?.vpcId)) { + if (Token.isUnresolved(options.securityGroupId) || Token.isUnresolved(options.securityGroupName) || Token.isUnresolved(options.vpc?.vpcId)) { throw new Error('All arguments to look up a security group must be concrete (no Tokens)'); } @@ -515,8 +515,8 @@ export class SecurityGroup extends SecurityGroupBase { this.securityGroup = new CfnSecurityGroup(this, 'Resource', { groupName: this.physicalName, groupDescription, - securityGroupIngress: Lazy.any({ produce: () => this.directIngressRules }, { omitEmptyArray: true } ), - securityGroupEgress: Lazy.any({ produce: () => this.directEgressRules }, { omitEmptyArray: true } ), + securityGroupIngress: Lazy.any({ produce: () => this.directIngressRules }, { omitEmptyArray: true }), + securityGroupEgress: Lazy.any({ produce: () => this.directEgressRules }, { omitEmptyArray: true }), vpcId: props.vpc.vpcId, }); @@ -552,7 +552,7 @@ export class SecurityGroup extends SecurityGroupBase { // In the case of "allowAllOutbound", we don't add any more rules. There // is only one rule which allows all traffic and that subsumes any other // rule. - if (!remoteRule) { // Warn only if addEgressRule() was explicitely called + if (!remoteRule) { // Warn only if addEgressRule() was explicitly called Annotations.of(this).addWarningV2('@aws-cdk/aws-ec2:ipv4IgnoreEgressRule', 'Ignoring Egress rule since \'allowAllOutbound\' is set to true; To add customized rules, set allowAllOutbound=false on the SecurityGroup'); } return; @@ -567,7 +567,7 @@ export class SecurityGroup extends SecurityGroupBase { // In the case of "allowAllIpv6Outbound", we don't add any more rules. There // is only one rule which allows all traffic and that subsumes any other // rule. - if (!remoteRule) { // Warn only if addEgressRule() was explicitely called + if (!remoteRule) { // Warn only if addEgressRule() was explicitly called Annotations.of(this).addWarningV2('@aws-cdk/aws-ec2:ipv6IgnoreEgressRule', 'Ignoring Egress rule since \'allowAllIpv6Outbound\' is set to true; To add customized rules, set allowAllIpv6Outbound=false on the SecurityGroup'); } return; @@ -653,7 +653,7 @@ export class SecurityGroup extends SecurityGroupBase { const description = this.allowAllOutbound ? ALLOW_ALL_RULE.description : MATCH_NO_TRAFFIC.description; super.addEgressRule(peer, port, description, false); } else { - const rule = this.allowAllOutbound? ALLOW_ALL_RULE : MATCH_NO_TRAFFIC; + const rule = this.allowAllOutbound ? ALLOW_ALL_RULE : MATCH_NO_TRAFFIC; this.directEgressRules.push(rule); } } diff --git a/packages/aws-cdk-lib/aws-rds/README.md b/packages/aws-cdk-lib/aws-rds/README.md index fd0a8a4ee66e1..5d31728d42680 100644 --- a/packages/aws-cdk-lib/aws-rds/README.md +++ b/packages/aws-cdk-lib/aws-rds/README.md @@ -1215,7 +1215,7 @@ new rds.ServerlessClusterFromSnapshot(this, 'Cluster', { You can access your Aurora DB cluster using the built-in Data API. The Data API doesn't require a persistent connection to the DB cluster. Instead, it provides a secure HTTP endpoint and integration with AWS SDKs. -The following example shows granting Data API access to a Lamba function. +The following example shows granting Data API access to a Lambda function. ```ts declare const vpc: ec2.Vpc; diff --git a/packages/aws-cdk-lib/aws-rds/lib/aurora-cluster-instance.ts b/packages/aws-cdk-lib/aws-rds/lib/aurora-cluster-instance.ts index 8ce1ff7a80540..20acf0fe4be40 100644 --- a/packages/aws-cdk-lib/aws-rds/lib/aurora-cluster-instance.ts +++ b/packages/aws-cdk-lib/aws-rds/lib/aurora-cluster-instance.ts @@ -145,7 +145,7 @@ export interface ServerlessV2ClusterInstanceProps extends ClusterInstanceOptions * * For serverless v2 instances this means: * - true: The serverless v2 reader will scale to match the writer instance (provisioned or serverless) - * - false: The serverless v2 reader will scale with the read workfload on the instance + * - false: The serverless v2 reader will scale with the read workload on the instance * * @default false */ diff --git a/packages/aws-cdk-lib/aws-rds/lib/instance.ts b/packages/aws-cdk-lib/aws-rds/lib/instance.ts index 6b7a0dfb87981..7d2337e5c118c 100644 --- a/packages/aws-cdk-lib/aws-rds/lib/instance.ts +++ b/packages/aws-cdk-lib/aws-rds/lib/instance.ts @@ -263,7 +263,7 @@ export enum LicenseModel { LICENSE_INCLUDED = 'license-included', /** - * Bring your own licencse. + * Bring your own license. */ BRING_YOUR_OWN_LICENSE = 'bring-your-own-license', @@ -1356,7 +1356,7 @@ export class DatabaseInstanceReadReplica extends DatabaseInstanceNew implements } // The read replica instance always uses the same engine as the source instance - // but some CF validations require the engine to be explicitely passed when some + // but some CF validations require the engine to be explicitly passed when some // properties are specified. const shouldPassEngine = props.domain != null;