diff --git a/infrastructure/parallelcluster-ui-cognito.yaml b/infrastructure/parallelcluster-ui-cognito.yaml index 93efd61d..cd5f47f9 100644 --- a/infrastructure/parallelcluster-ui-cognito.yaml +++ b/infrastructure/parallelcluster-ui-cognito.yaml @@ -27,7 +27,7 @@ Parameters: Default: '' Conditions: - GovCloud: !Equals [!Ref AWS::Region, 'us-gov-west-1'] + GovCloud: !Equals [!Ref 'AWS::Partition', 'aws-us-gov'] UsePermissionBoundary: !Not [ !Equals [ !Ref PermissionsBoundaryPolicy, '' ] ] UseCustomDomain: !Not [!Equals [!Ref CustomDomain, '']] diff --git a/infrastructure/parallelcluster-ui.yaml b/infrastructure/parallelcluster-ui.yaml index 0dfe956d..6815d877 100644 --- a/infrastructure/parallelcluster-ui.yaml +++ b/infrastructure/parallelcluster-ui.yaml @@ -162,7 +162,7 @@ Conditions: - !Not [!Equals [!Ref SNSRole, ""]] UseNewCognito: !Not [ Condition: UseExistingCognito] - InGovCloud: !Equals ['us-gov-west-1', !Ref "AWS::Region"] + InGovCloud: !Equals [!Ref 'AWS::Partition', 'aws-us-gov'] UsePermissionBoundary: !Not [!Equals [!Ref PermissionsBoundaryPolicy, '']] UsePermissionBoundaryPCAPI: !Not [!Equals [!Ref PermissionsBoundaryPolicyPCAPI, '']] UseIAMRoleAndPolicyPrefix: !Not [!Equals [!Ref IAMRoleAndPolicyPrefix, '']] @@ -517,7 +517,7 @@ Resources: Action: - 'sts:AssumeRole' ManagedPolicyArns: - - 'arn:aws:iam::aws:policy/service-role/AmazonAPIGatewayPushToCloudWatchLogs' + - 'arn:${AWS::Partition}:iam::aws:policy/service-role/AmazonAPIGatewayPushToCloudWatchLogs' PermissionsBoundary: !If [UsePermissionBoundary, !Ref PermissionsBoundaryPolicy, !Ref 'AWS::NoValue'] ApiGatewayAccessLog: