From d2b69269d9c79bae41b60b8997d0dfe0c492ae7e Mon Sep 17 00:00:00 2001 From: Brett Andrews <116007342+BrettBooster@users.noreply.github.com> Date: Tue, 25 Oct 2022 06:32:30 -0700 Subject: [PATCH] docs: Fix typo (#11470) --- docs/providers/aws/guide/credentials.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/providers/aws/guide/credentials.md b/docs/providers/aws/guide/credentials.md index 8bc9e425a..57a3b3938 100644 --- a/docs/providers/aws/guide/credentials.md +++ b/docs/providers/aws/guide/credentials.md @@ -223,7 +223,7 @@ _Please, refer to the [`invoke local`](https://serverless.com/framework/docs/pro It is possible to use local AWS credentials to _assume_ another AWS role. -That allows the deployment (are all other CLI commands) to be performed under a different role. To achieve this, [follow this documentation from AWS](https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-role.html). +That allows the deployment (and all other CLI commands) to be performed under a different role. To achieve this, [follow this documentation from AWS](https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-role.html). Note that `serverless.yml` also offers the `provider.iam.deploymentRole` option. This lets us force CloudFormation to use a different role when deploying: