Skip to content

Commit 51a93f3

Browse files
author
awstools
committed
docs(client-cloudformation): Documentation updates for AWS CloudFormation
1 parent 7b19946 commit 51a93f3

File tree

1 file changed

+32
-36
lines changed

1 file changed

+32
-36
lines changed

clients/client-cloudformation/src/models/models_0.ts

Lines changed: 32 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -2287,11 +2287,10 @@ export interface CreateStackInput {
22872287

22882288
/**
22892289
* @public
2290-
* <p>This deletion policy deletes newly created resources, but retains existing resources, when a stack operation is
2291-
* rolled back. This ensures new, empty, and unused resources are deleted, while critical resources and their data are
2292-
* retained. <code>RetainExceptOnCreate</code> can be specified for any resource that supports the
2293-
* <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-attribute-deletionpolicy.html">
2294-
* DeletionPolicy</a> attribute.</p>
2290+
* <p>When set to <code>true</code>, newly created resources are deleted when the operation rolls back. This includes newly
2291+
* created resources marked with a deletion policy of <code>Retain</code>.</p>
2292+
* <p>Default: <code>false</code>
2293+
* </p>
22952294
*/
22962295
RetainExceptOnCreate?: boolean;
22972296
}
@@ -2834,19 +2833,19 @@ export interface CreateStackSetInput {
28342833
* </p>
28352834
* </li>
28362835
* </ul>
2837-
* <p>For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/using-iam-template.html#capabilities">Acknowledging IAM Resources in CloudFormation Templates</a>.</p>
2836+
* <p>For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities">Acknowledging IAM Resources in CloudFormation Templates</a>.</p>
28382837
* </li>
28392838
* <li>
28402839
* <p>
28412840
* <code>CAPABILITY_AUTO_EXPAND</code>
28422841
* </p>
28432842
* <p>Some templates reference macros. If your stack set template references one or more macros, you must create the
28442843
* stack set directly from the processed template, without first reviewing the resulting changes in a change set. To
2845-
* create the stack set directly, you must acknowledge this capability. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/template-macros.html">Using CloudFormation Macros to Perform
2844+
* create the stack set directly, you must acknowledge this capability. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html">Using CloudFormation Macros to Perform
28462845
* Custom Processing on Templates</a>.</p>
28472846
* <important>
28482847
* <p>Stack sets with service-managed permissions don't currently support the use of macros in templates. (This
2849-
* includes the <a href="https://docs.aws.amazon.com/AWSCloudFormation/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html">AWS::Include</a> and <a href="https://docs.aws.amazon.com/AWSCloudFormation/transform-aws-serverless.html">AWS::Serverless</a> transforms, which are macros hosted by CloudFormation.) Even if you specify this capability for a
2848+
* includes the <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html">AWS::Include</a> and <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html">AWS::Serverless</a> transforms, which are macros hosted by CloudFormation.) Even if you specify this capability for a
28502849
* stack set with service-managed permissions, if you reference a macro in your template the stack set operation will
28512850
* fail.</p>
28522851
* </important>
@@ -2871,7 +2870,7 @@ export interface CreateStackSetInput {
28712870
* @public
28722871
* <p>The Amazon Resource Name (ARN) of the IAM role to use to create this stack set.</p>
28732872
* <p>Specify an IAM role only if you are using customized administrator roles to control which users
2874-
* or groups can manage specific stack sets within the same administrator account. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/stacksets-prereqs.html">Prerequisites: Granting Permissions for Stack Set
2873+
* or groups can manage specific stack sets within the same administrator account. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-prereqs.html">Prerequisites: Granting Permissions for Stack Set
28752874
* Operations</a> in the <i>CloudFormation User Guide</i>.</p>
28762875
*/
28772876
AdministrationRoleARN?: string;
@@ -4981,7 +4980,8 @@ export interface DescribeStacksInput {
49814980
* @public
49824981
* <note>
49834982
* <p>If you don't pass a parameter to <code>StackName</code>, the API returns a response that describes all
4984-
* resources in the account. This requires <code>ListStacks</code> and <code>DescribeStacks</code> permissions.</p>
4983+
* resources in the account, which can impact performance. This requires <code>ListStacks</code> and <code>DescribeStacks</code> permissions.</p>
4984+
* <p>Consider using the <a>ListStacks</a> API if you're not passing a parameter to <code>StackName</code>.</p>
49854985
* <p>The IAM policy below can be added to IAM policies when you want to limit
49864986
* resource-level permissions and avoid returning a response when no parameter is sent in the request:</p>
49874987
* <p>\{ "Version": "2012-10-17", "Statement": [\{ "Effect": "Deny", "Action": "cloudformation:DescribeStacks",
@@ -5278,11 +5278,10 @@ export interface Stack {
52785278

52795279
/**
52805280
* @public
5281-
* <p>This deletion policy deletes newly created resources, but retains existing resources, when a stack operation is
5282-
* rolled back. This ensures new, empty, and unused resources are deleted, while critical resources and their data are
5283-
* retained. <code>RetainExceptOnCreate</code> can be specified for any resource that supports the
5284-
* <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-attribute-deletionpolicy.html">
5285-
* DeletionPolicy</a> attribute.</p>
5281+
* <p>When set to <code>true</code>, newly created resources are deleted when the operation rolls back. This includes newly
5282+
* created resources marked with a deletion policy of <code>Retain</code>.</p>
5283+
* <p>Default: <code>false</code>
5284+
* </p>
52865285
*/
52875286
RetainExceptOnCreate?: boolean;
52885287
}
@@ -5573,7 +5572,7 @@ export interface StackSet {
55735572
* @public
55745573
* <p>The Amazon Resource Name (ARN) of the IAM role used to create or update the stack set.</p>
55755574
* <p>Use customized administrator roles to control which users or groups can manage specific stack sets within the
5576-
* same administrator account. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/stacksets-prereqs.html">Prerequisites: Granting Permissions for Stack Set Operations</a>
5575+
* same administrator account. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-prereqs.html">Prerequisites: Granting Permissions for Stack Set Operations</a>
55775576
* in the <i>CloudFormation User Guide</i>.</p>
55785577
*/
55795578
AdministrationRoleARN?: string;
@@ -5815,7 +5814,7 @@ export interface StackSetOperation {
58155814
* @public
58165815
* <p>The Amazon Resource Name (ARN) of the IAM role used to perform this stack set operation.</p>
58175816
* <p>Use customized administrator roles to control which users or groups can manage specific stack sets within the
5818-
* same administrator account. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/stacksets-prereqs.html">Define Permissions for Multiple Administrators</a> in the
5817+
* same administrator account. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-prereqs.html">Define Permissions for Multiple Administrators</a> in the
58195818
* <i>CloudFormation User Guide</i>.</p>
58205819
*/
58215820
AdministrationRoleARN?: string;
@@ -6609,11 +6608,10 @@ export interface ExecuteChangeSetInput {
66096608

66106609
/**
66116610
* @public
6612-
* <p>This deletion policy deletes newly created resources, but retains existing resources, when a stack operation is
6613-
* rolled back. This ensures new, empty, and unused resources are deleted, while critical resources and their data are
6614-
* retained. <code>RetainExceptOnCreate</code> can be specified for any resource that supports the
6615-
* <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-attribute-deletionpolicy.html">
6616-
* DeletionPolicy</a> attribute.</p>
6611+
* <p>When set to <code>true</code>, newly created resources are deleted when the operation rolls back. This includes newly
6612+
* created resources marked with a deletion policy of <code>Retain</code>.</p>
6613+
* <p>Default: <code>false</code>
6614+
* </p>
66176615
*/
66186616
RetainExceptOnCreate?: boolean;
66196617
}
@@ -9408,11 +9406,10 @@ export interface RollbackStackInput {
94089406

94099407
/**
94109408
* @public
9411-
* <p>This deletion policy deletes newly created resources, but retains existing resources, when a stack operation is
9412-
* rolled back. This ensures new, empty, and unused resources are deleted, while critical resources and their data are
9413-
* retained. <code>RetainExceptOnCreate</code> can be specified for any resource that supports the
9414-
* <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-attribute-deletionpolicy.html">
9415-
* DeletionPolicy</a> attribute.</p>
9409+
* <p>When set to <code>true</code>, newly created resources are deleted when the operation rolls back. This includes newly
9410+
* created resources marked with a deletion policy of <code>Retain</code>.</p>
9411+
* <p>Default: <code>false</code>
9412+
* </p>
94169413
*/
94179414
RetainExceptOnCreate?: boolean;
94189415
}
@@ -9979,11 +9976,10 @@ export interface UpdateStackInput {
99799976

99809977
/**
99819978
* @public
9982-
* <p>This deletion policy deletes newly created resources, but retains existing resources, when a stack operation is
9983-
* rolled back. This ensures new, empty, and unused resources are deleted, while critical resources and their data are
9984-
* retained. <code>RetainExceptOnCreate</code> can be specified for any resource that supports the
9985-
* <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-attribute-deletionpolicy.html">
9986-
* DeletionPolicy</a> attribute.</p>
9979+
* <p>When set to <code>true</code>, newly created resources are deleted when the operation rolls back. This includes newly
9980+
* created resources marked with a deletion policy of <code>Retain</code>.</p>
9981+
* <p>Default: <code>false</code>
9982+
* </p>
99879983
*/
99889984
RetainExceptOnCreate?: boolean;
99899985
}
@@ -10241,19 +10237,19 @@ export interface UpdateStackSetInput {
1024110237
* </p>
1024210238
* </li>
1024310239
* </ul>
10244-
* <p>For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/using-iam-template.html#capabilities">Acknowledging IAM Resources in CloudFormation Templates</a>.</p>
10240+
* <p>For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities">Acknowledging IAM Resources in CloudFormation Templates</a>.</p>
1024510241
* </li>
1024610242
* <li>
1024710243
* <p>
1024810244
* <code>CAPABILITY_AUTO_EXPAND</code>
1024910245
* </p>
1025010246
* <p>Some templates reference macros. If your stack set template references one or more macros, you must update the
1025110247
* stack set directly from the processed template, without first reviewing the resulting changes in a change set. To
10252-
* update the stack set directly, you must acknowledge this capability. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/template-macros.html">Using CloudFormation Macros to Perform
10248+
* update the stack set directly, you must acknowledge this capability. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html">Using CloudFormation Macros to Perform
1025310249
* Custom Processing on Templates</a>.</p>
1025410250
* <important>
1025510251
* <p>Stack sets with service-managed permissions do not currently support the use of macros in templates. (This
10256-
* includes the <a href="https://docs.aws.amazon.com/AWSCloudFormation/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html">AWS::Include</a> and <a href="https://docs.aws.amazon.com/AWSCloudFormation/transform-aws-serverless.html">AWS::Serverless</a> transforms, which are macros hosted by CloudFormation.) Even if you specify this capability for a
10252+
* includes the <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html">AWS::Include</a> and <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html">AWS::Serverless</a> transforms, which are macros hosted by CloudFormation.) Even if you specify this capability for a
1025710253
* stack set with service-managed permissions, if you reference a macro in your template the stack set operation will
1025810254
* fail.</p>
1025910255
* </important>
@@ -10302,7 +10298,7 @@ export interface UpdateStackSetInput {
1030210298
* @public
1030310299
* <p>The Amazon Resource Name (ARN) of the IAM role to use to update this stack set.</p>
1030410300
* <p>Specify an IAM role only if you are using customized administrator roles to control which users
10305-
* or groups can manage specific stack sets within the same administrator account. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/stacksets-prereqs.html">Granting Permissions for Stack Set
10301+
* or groups can manage specific stack sets within the same administrator account. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-prereqs.html">Granting Permissions for Stack Set
1030610302
* Operations</a> in the <i>CloudFormation User Guide</i>.</p>
1030710303
* <p>If you specified a customized administrator role when you created the stack set, you must specify a customized
1030810304
* administrator role, even if it is the same customized administrator role used with this stack set previously.</p>

0 commit comments

Comments
 (0)