You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* <p>For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/using-iam-template.html#capabilities">Acknowledging IAM Resources in CloudFormation Templates</a>.</p>
2836
+
* <p>For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities">Acknowledging IAM Resources in CloudFormation Templates</a>.</p>
2838
2837
* </li>
2839
2838
* <li>
2840
2839
* <p>
2841
2840
* <code>CAPABILITY_AUTO_EXPAND</code>
2842
2841
* </p>
2843
2842
* <p>Some templates reference macros. If your stack set template references one or more macros, you must create the
2844
2843
* stack set directly from the processed template, without first reviewing the resulting changes in a change set. To
2845
-
* create the stack set directly, you must acknowledge this capability. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/template-macros.html">Using CloudFormation Macros to Perform
2844
+
* create the stack set directly, you must acknowledge this capability. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html">Using CloudFormation Macros to Perform
2846
2845
* Custom Processing on Templates</a>.</p>
2847
2846
* <important>
2848
2847
* <p>Stack sets with service-managed permissions don't currently support the use of macros in templates. (This
2849
-
* includes the <a href="https://docs.aws.amazon.com/AWSCloudFormation/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html">AWS::Include</a> and <a href="https://docs.aws.amazon.com/AWSCloudFormation/transform-aws-serverless.html">AWS::Serverless</a> transforms, which are macros hosted by CloudFormation.) Even if you specify this capability for a
2848
+
* includes the <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html">AWS::Include</a> and <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html">AWS::Serverless</a> transforms, which are macros hosted by CloudFormation.) Even if you specify this capability for a
2850
2849
* stack set with service-managed permissions, if you reference a macro in your template the stack set operation will
* <p>The Amazon Resource Name (ARN) of the IAM role to use to create this stack set.</p>
2873
2872
* <p>Specify an IAM role only if you are using customized administrator roles to control which users
2874
-
* or groups can manage specific stack sets within the same administrator account. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/stacksets-prereqs.html">Prerequisites: Granting Permissions for Stack Set
2873
+
* or groups can manage specific stack sets within the same administrator account. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-prereqs.html">Prerequisites: Granting Permissions for Stack Set
2875
2874
* Operations</a> in the <i>CloudFormation User Guide</i>.</p>
* <p>When set to <code>true</code>, newly created resources are deleted when the operation rolls back. This includes newly
5282
+
* created resources marked with a deletion policy of <code>Retain</code>.</p>
5283
+
* <p>Default: <code>false</code>
5284
+
* </p>
5286
5285
*/
5287
5286
RetainExceptOnCreate?: boolean;
5288
5287
}
@@ -5573,7 +5572,7 @@ export interface StackSet {
5573
5572
* @public
5574
5573
* <p>The Amazon Resource Name (ARN) of the IAM role used to create or update the stack set.</p>
5575
5574
* <p>Use customized administrator roles to control which users or groups can manage specific stack sets within the
5576
-
* same administrator account. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/stacksets-prereqs.html">Prerequisites: Granting Permissions for Stack Set Operations</a>
5575
+
* same administrator account. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-prereqs.html">Prerequisites: Granting Permissions for Stack Set Operations</a>
* <p>The Amazon Resource Name (ARN) of the IAM role used to perform this stack set operation.</p>
5817
5816
* <p>Use customized administrator roles to control which users or groups can manage specific stack sets within the
5818
-
* same administrator account. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/stacksets-prereqs.html">Define Permissions for Multiple Administrators</a> in the
5817
+
* same administrator account. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-prereqs.html">Define Permissions for Multiple Administrators</a> in the
* <p>For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/using-iam-template.html#capabilities">Acknowledging IAM Resources in CloudFormation Templates</a>.</p>
10240
+
* <p>For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities">Acknowledging IAM Resources in CloudFormation Templates</a>.</p>
10245
10241
* </li>
10246
10242
* <li>
10247
10243
* <p>
10248
10244
* <code>CAPABILITY_AUTO_EXPAND</code>
10249
10245
* </p>
10250
10246
* <p>Some templates reference macros. If your stack set template references one or more macros, you must update the
10251
10247
* stack set directly from the processed template, without first reviewing the resulting changes in a change set. To
10252
-
* update the stack set directly, you must acknowledge this capability. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/template-macros.html">Using CloudFormation Macros to Perform
10248
+
* update the stack set directly, you must acknowledge this capability. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html">Using CloudFormation Macros to Perform
10253
10249
* Custom Processing on Templates</a>.</p>
10254
10250
* <important>
10255
10251
* <p>Stack sets with service-managed permissions do not currently support the use of macros in templates. (This
10256
-
* includes the <a href="https://docs.aws.amazon.com/AWSCloudFormation/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html">AWS::Include</a> and <a href="https://docs.aws.amazon.com/AWSCloudFormation/transform-aws-serverless.html">AWS::Serverless</a> transforms, which are macros hosted by CloudFormation.) Even if you specify this capability for a
10252
+
* includes the <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html">AWS::Include</a> and <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html">AWS::Serverless</a> transforms, which are macros hosted by CloudFormation.) Even if you specify this capability for a
10257
10253
* stack set with service-managed permissions, if you reference a macro in your template the stack set operation will
* <p>The Amazon Resource Name (ARN) of the IAM role to use to update this stack set.</p>
10304
10300
* <p>Specify an IAM role only if you are using customized administrator roles to control which users
10305
-
* or groups can manage specific stack sets within the same administrator account. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/stacksets-prereqs.html">Granting Permissions for Stack Set
10301
+
* or groups can manage specific stack sets within the same administrator account. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-prereqs.html">Granting Permissions for Stack Set
10306
10302
* Operations</a> in the <i>CloudFormation User Guide</i>.</p>
10307
10303
* <p>If you specified a customized administrator role when you created the stack set, you must specify a customized
10308
10304
* administrator role, even if it is the same customized administrator role used with this stack set previously.</p>
0 commit comments