Skip to content

Commit 3b3a09d

Browse files
authored
docs: fix duplicate word typos in README files (#37370)
### Reason for this change Fix repeated words in README files that serve as the official documentation landing pages. ### Description of changes - `a a` → `a` (aws-cognito-identitypool) - `the the` → `the` (aws-cognito, aws-ec2, aws-stepfunctions) - `of of` → `of` (aws-ec2) - `at at` → `at` (aws-ecr) ### Description of how you validated changes Documentation-only changes. No functional impact. ### Checklist - [x] My code adheres to the [CONTRIBUTING GUIDE](https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md) and [DESIGN GUIDELINES](https://github.com/aws/aws-cdk/blob/main/docs/DESIGN_GUIDELINES.md)
1 parent 0f62b21 commit 3b3a09d

File tree

5 files changed

+6
-6
lines changed

5 files changed

+6
-6
lines changed

packages/aws-cdk-lib/aws-cognito-identitypool/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
[Amazon Cognito Identity Pools](https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-identity.html) enable you to grant your users access to other AWS services.
44

55
Identity Pools are one of the two main components of [Amazon Cognito](https://docs.aws.amazon.com/cognito/latest/developerguide/what-is-amazon-cognito.html), which provides authentication, authorization, and
6-
user management for your web and mobile apps. Your users can sign in through a a trusted identity provider, like a user
6+
user management for your web and mobile apps. Your users can sign in through a trusted identity provider, like a user
77
pool or a SAML 2.0 service, as well as with third party providers such as Facebook, Amazon, Google or Apple.
88

99
The other main component in Amazon Cognito is [user pools](https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-identity-pools.html). User Pools are user directories that provide sign-up and

packages/aws-cdk-lib/aws-cognito/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -823,7 +823,7 @@ about the [OAuth 2.0 authorization framework](https://tools.ietf.org/html/rfc674
823823
implementation of
824824
OAuth2.0](https://aws.amazon.com/blogs/mobile/understanding-amazon-cognito-user-pool-oauth-2-0-grants/).
825825

826-
The following code configures an app client with the authorization code grant flow and registers the the app's welcome
826+
The following code configures an app client with the authorization code grant flow and registers the app's welcome
827827
page as a callback (or redirect) URL. It also configures the access token scope to 'openid'. All of these concepts can
828828
be found in the [OAuth 2.0 RFC](https://tools.ietf.org/html/rfc6749).
829829

packages/aws-cdk-lib/aws-ec2/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -415,7 +415,7 @@ const vpc = new ec2.Vpc(this, 'TheVPC', {
415415
// group of the same type.
416416
name: 'Ingress',
417417

418-
// 'cidrMask' specifies the IP addresses in the range of of individual
418+
// 'cidrMask' specifies the IP addresses in the range of individual
419419
// subnets in the group. Each of the subnets in this group will contain
420420
// `2^(32 address bits - 24 subnet bits) - 2 reserved addresses = 254`
421421
// usable IP addresses.
@@ -619,7 +619,7 @@ instance around:
619619
### Importing an existing VPC
620620

621621
If your VPC is created outside your CDK app, you can use `Vpc.fromLookup()`.
622-
The CDK CLI will search for the specified VPC in the the stack's region and
622+
The CDK CLI will search for the specified VPC in the stack's region and
623623
account, and import the subnet configuration. Looking up can be done by VPC
624624
ID, but more flexibly by searching for a specific tag on the VPC.
625625

packages/aws-cdk-lib/aws-ecr/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ repository.onImageScanCompleted('ImageScanComplete')
3939
Besides the Amazon ECR APIs, ECR also allows the Docker CLI or a language-specific Docker library to push and pull
4040
images from an ECR repository. However, the Docker CLI does not support native IAM authentication methods and
4141
additional steps must be taken so that Amazon ECR can authenticate and authorize Docker push and pull requests.
42-
More information can be found at at [Registry Authentication](https://docs.aws.amazon.com/AmazonECR/latest/userguide/Registries.html#registry_auth).
42+
More information can be found at [Registry Authentication](https://docs.aws.amazon.com/AmazonECR/latest/userguide/Registries.html#registry_auth).
4343

4444
A Docker authorization token can be obtained using the `GetAuthorizationToken` ECR API. The following code snippets
4545
grants an IAM user access to call this API.

packages/aws-cdk-lib/aws-stepfunctions/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -582,7 +582,7 @@ hits a particular time. The time to wait may be taken from the execution's JSON
582582
state.
583583

584584
```ts
585-
// Wait until it's the time mentioned in the the state object's "triggerTime"
585+
// Wait until it's the time mentioned in the state object's "triggerTime"
586586
// field.
587587
const wait = new sfn.Wait(this, 'Wait For Trigger Time', {
588588
time: sfn.WaitTime.timestampPath('$.triggerTime'),

0 commit comments

Comments
 (0)