aws-sdk-cloudformation 1.11.1 → 1.12.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 4d8fca7d1d5ffc7ef373fc7bacc87f3cfbd72484
4
- data.tar.gz: 546e02c9f6f9665be911564cbd8bd5d125d2312c
3
+ metadata.gz: 8c2393e60a034236ba226606b4082ac6ba7caf67
4
+ data.tar.gz: bcd02e5525e019b7fb48991708f538357d490fc0
5
5
  SHA512:
6
- metadata.gz: ce183026f02c62e94a91ad06abe15a6dbb600296ab5af543d25bca9c6899d9d117040ac801fcc2da248d46579052480a0e7908d9bb7bd0313d6b367cffc0438f
7
- data.tar.gz: a9b60b72764930ebfe3845dc75886cd6b62acb4219a7a20af6ba491b82b88f738af997854afcd07291d525bff00d191997f75a62286b51e1655b776b060f713b
6
+ metadata.gz: b028af44a0014f79bb8b87ade5a876f6b0096cbeb6b812d4dede5ce28063e068cc8edf8190b0021a6cdd4075d6300374991333e08cd06d7b59a301cbad607bab
7
+ data.tar.gz: 96c56422c49811ad2433fe340fbc68537e9e46a1ca6fef68db8cbd65b694c57595751dc428c24b826f4b5349f9303ec92bd7022d2bcdb6382970ef9a210c0977
@@ -47,6 +47,6 @@ require_relative 'aws-sdk-cloudformation/customizations'
47
47
  # @service
48
48
  module Aws::CloudFormation
49
49
 
50
- GEM_VERSION = '1.11.1'
50
+ GEM_VERSION = '1.12.0'
51
51
 
52
52
  end
@@ -544,7 +544,7 @@ module Aws::CloudFormation
544
544
  # resolved_value: "ParameterValue",
545
545
  # },
546
546
  # ],
547
- # capabilities: ["CAPABILITY_IAM"], # accepts CAPABILITY_IAM, CAPABILITY_NAMED_IAM
547
+ # capabilities: ["CAPABILITY_IAM"], # accepts CAPABILITY_IAM, CAPABILITY_NAMED_IAM, CAPABILITY_AUTO_EXPAND
548
548
  # resource_types: ["ResourceType"],
549
549
  # role_arn: "RoleARN",
550
550
  # rollback_configuration: {
@@ -653,29 +653,80 @@ module Aws::CloudFormation
653
653
  # or your Command Line Interface (CLI).
654
654
  #
655
655
  # @option params [Array<String>] :capabilities
656
- # A list of values that you must specify before AWS CloudFormation can
657
- # create certain stacks. Some stack templates might include resources
658
- # that can affect permissions in your AWS account, for example, by
659
- # creating new AWS Identity and Access Management (IAM) users. For those
660
- # stacks, you must explicitly acknowledge their capabilities by
661
- # specifying this parameter.
656
+ # In some cases, you must explicity acknowledge that your stack template
657
+ # contains certain capabilities in order for AWS CloudFormation to
658
+ # create the stack.
662
659
  #
663
- # The only valid values are `CAPABILITY_IAM` and `CAPABILITY_NAMED_IAM`.
664
- # The following resources require you to specify this parameter: [
665
- # AWS::IAM::AccessKey][1], [ AWS::IAM::Group][2], [
666
- # AWS::IAM::InstanceProfile][3], [ AWS::IAM::Policy][4], [
667
- # AWS::IAM::Role][5], [ AWS::IAM::User][6], and [
668
- # AWS::IAM::UserToGroupAddition][7]. If your stack template contains
669
- # these resources, we recommend that you review all permissions
670
- # associated with them and edit their permissions if necessary.
660
+ # * `CAPABILITY_IAM` and `CAPABILITY_NAMED_IAM`
671
661
  #
672
- # If you have IAM resources, you can specify either capability. If you
673
- # have IAM resources with custom names, you must specify
674
- # `CAPABILITY_NAMED_IAM`. If you don't specify this parameter, this
675
- # action returns an `InsufficientCapabilities` error.
662
+ # Some stack templates might include resources that can affect
663
+ # permissions in your AWS account; for example, by creating new AWS
664
+ # Identity and Access Management (IAM) users. For those stacks, you
665
+ # must explicitly acknowledge this by specifying one of these
666
+ # capabilities.
676
667
  #
677
- # For more information, see [Acknowledging IAM Resources in AWS
678
- # CloudFormation Templates][8].
668
+ # The following IAM resources require you to specify either the
669
+ # `CAPABILITY_IAM` or `CAPABILITY_NAMED_IAM` capability.
670
+ #
671
+ # * If you have IAM resources, you can specify either capability.
672
+ #
673
+ # * If you have IAM resources with custom names, you *must* specify
674
+ # `CAPABILITY_NAMED_IAM`.
675
+ #
676
+ # * If you don't specify either of these capabilities, AWS
677
+ # CloudFormation returns an `InsufficientCapabilities` error.
678
+ #
679
+ # If your stack template contains these resources, we recommend that
680
+ # you review all permissions associated with them and edit their
681
+ # permissions if necessary.
682
+ #
683
+ # * [ AWS::IAM::AccessKey][1]
684
+ #
685
+ # * [ AWS::IAM::Group][2]
686
+ #
687
+ # * [ AWS::IAM::InstanceProfile][3]
688
+ #
689
+ # * [ AWS::IAM::Policy][4]
690
+ #
691
+ # * [ AWS::IAM::Role][5]
692
+ #
693
+ # * [ AWS::IAM::User][6]
694
+ #
695
+ # * [ AWS::IAM::UserToGroupAddition][7]
696
+ #
697
+ # For more information, see [Acknowledging IAM Resources in AWS
698
+ # CloudFormation Templates][8].
699
+ #
700
+ # * `CAPABILITY_AUTO_EXPAND`
701
+ #
702
+ # Some template contain macros. Macros perform custom processing on
703
+ # templates; this can include simple actions like find-and-replace
704
+ # operations, all the way to extensive transformations of entire
705
+ # templates. Because of this, users typically create a change set from
706
+ # the processed template, so that they can review the changes
707
+ # resulting from the macros before actually creating the stack. If
708
+ # your stack template contains one or more macros, and you choose to
709
+ # create a stack directly from the processed template, without first
710
+ # reviewing the resulting changes in a change set, you must
711
+ # acknowledge this capability. This includes the [AWS::Include][9] and
712
+ # [AWS::Serverless][10] transforms, which are macros hosted by AWS
713
+ # CloudFormation.
714
+ #
715
+ # Change sets do not currently support nested stacks. If you want to
716
+ # create a stack from a stack template that contains macros *and*
717
+ # nested stacks, you must create the stack directly from the template
718
+ # using this capability.
719
+ #
720
+ # You should only create stacks directly from a stack template that
721
+ # contains macros if you know what processing the macro performs.
722
+ #
723
+ # Each macro relies on an underlying Lambda service function for
724
+ # processing stack templates. Be aware that the Lambda function owner
725
+ # can update the function operation without AWS CloudFormation being
726
+ # notified.
727
+ #
728
+ # For more information, see [Using AWS CloudFormation Macros to
729
+ # Perform Custom Processing on Templates][11].
679
730
  #
680
731
  #
681
732
  #
@@ -686,7 +737,10 @@ module Aws::CloudFormation
686
737
  # [5]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html
687
738
  # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
688
739
  # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
689
- # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
740
+ # [8]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
741
+ # [9]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
742
+ # [10]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
743
+ # [11]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
690
744
  #
691
745
  # @option params [Array<String>] :resource_types
692
746
  # The template resource types that you have permissions to work with for
@@ -819,7 +873,7 @@ module Aws::CloudFormation
819
873
  # },
820
874
  # timeout_in_minutes: 1,
821
875
  # notification_arns: ["NotificationARN"],
822
- # capabilities: ["CAPABILITY_IAM"], # accepts CAPABILITY_IAM, CAPABILITY_NAMED_IAM
876
+ # capabilities: ["CAPABILITY_IAM"], # accepts CAPABILITY_IAM, CAPABILITY_NAMED_IAM, CAPABILITY_AUTO_EXPAND
823
877
  # resource_types: ["ResourceType"],
824
878
  # role_arn: "RoleARN",
825
879
  # on_failure: "DO_NOTHING", # accepts DO_NOTHING, ROLLBACK, DELETE
@@ -1119,7 +1173,7 @@ module Aws::CloudFormation
1119
1173
  # resolved_value: "ParameterValue",
1120
1174
  # },
1121
1175
  # ],
1122
- # capabilities: ["CAPABILITY_IAM"], # accepts CAPABILITY_IAM, CAPABILITY_NAMED_IAM
1176
+ # capabilities: ["CAPABILITY_IAM"], # accepts CAPABILITY_IAM, CAPABILITY_NAMED_IAM, CAPABILITY_AUTO_EXPAND
1123
1177
  # tags: [
1124
1178
  # {
1125
1179
  # key: "TagKey", # required
@@ -1455,7 +1509,7 @@ module Aws::CloudFormation
1455
1509
  # resp.rollback_configuration.rollback_triggers[0].type #=> String
1456
1510
  # resp.rollback_configuration.monitoring_time_in_minutes #=> Integer
1457
1511
  # resp.capabilities #=> Array
1458
- # resp.capabilities[0] #=> String, one of "CAPABILITY_IAM", "CAPABILITY_NAMED_IAM"
1512
+ # resp.capabilities[0] #=> String, one of "CAPABILITY_IAM", "CAPABILITY_NAMED_IAM", "CAPABILITY_AUTO_EXPAND"
1459
1513
  # resp.tags #=> Array
1460
1514
  # resp.tags[0].key #=> String
1461
1515
  # resp.tags[0].value #=> String
@@ -1941,7 +1995,7 @@ module Aws::CloudFormation
1941
1995
  # resp.stack_set.parameters[0].use_previous_value #=> Boolean
1942
1996
  # resp.stack_set.parameters[0].resolved_value #=> String
1943
1997
  # resp.stack_set.capabilities #=> Array
1944
- # resp.stack_set.capabilities[0] #=> String, one of "CAPABILITY_IAM", "CAPABILITY_NAMED_IAM"
1998
+ # resp.stack_set.capabilities[0] #=> String, one of "CAPABILITY_IAM", "CAPABILITY_NAMED_IAM", "CAPABILITY_AUTO_EXPAND"
1945
1999
  # resp.stack_set.tags #=> Array
1946
2000
  # resp.stack_set.tags[0].key #=> String
1947
2001
  # resp.stack_set.tags[0].value #=> String
@@ -2066,7 +2120,7 @@ module Aws::CloudFormation
2066
2120
  # resp.stacks[0].notification_arns[0] #=> String
2067
2121
  # resp.stacks[0].timeout_in_minutes #=> Integer
2068
2122
  # resp.stacks[0].capabilities #=> Array
2069
- # resp.stacks[0].capabilities[0] #=> String, one of "CAPABILITY_IAM", "CAPABILITY_NAMED_IAM"
2123
+ # resp.stacks[0].capabilities[0] #=> String, one of "CAPABILITY_IAM", "CAPABILITY_NAMED_IAM", "CAPABILITY_AUTO_EXPAND"
2070
2124
  # resp.stacks[0].outputs #=> Array
2071
2125
  # resp.stacks[0].outputs[0].output_key #=> String
2072
2126
  # resp.stacks[0].outputs[0].output_value #=> String
@@ -2517,7 +2571,7 @@ module Aws::CloudFormation
2517
2571
  # resp.parameters[0].parameter_constraints.allowed_values[0] #=> String
2518
2572
  # resp.description #=> String
2519
2573
  # resp.capabilities #=> Array
2520
- # resp.capabilities[0] #=> String, one of "CAPABILITY_IAM", "CAPABILITY_NAMED_IAM"
2574
+ # resp.capabilities[0] #=> String, one of "CAPABILITY_IAM", "CAPABILITY_NAMED_IAM", "CAPABILITY_AUTO_EXPAND"
2521
2575
  # resp.capabilities_reason #=> String
2522
2576
  # resp.resource_types #=> Array
2523
2577
  # resp.resource_types[0] #=> String
@@ -3210,29 +3264,80 @@ module Aws::CloudFormation
3210
3264
  # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/APIReference/API_Parameter.html
3211
3265
  #
3212
3266
  # @option params [Array<String>] :capabilities
3213
- # A list of values that you must specify before AWS CloudFormation can
3214
- # update certain stacks. Some stack templates might include resources
3215
- # that can affect permissions in your AWS account, for example, by
3216
- # creating new AWS Identity and Access Management (IAM) users. For those
3217
- # stacks, you must explicitly acknowledge their capabilities by
3218
- # specifying this parameter.
3267
+ # In some cases, you must explicity acknowledge that your stack template
3268
+ # contains certain capabilities in order for AWS CloudFormation to
3269
+ # update the stack.
3219
3270
  #
3220
- # The only valid values are `CAPABILITY_IAM` and `CAPABILITY_NAMED_IAM`.
3221
- # The following resources require you to specify this parameter: [
3222
- # AWS::IAM::AccessKey][1], [ AWS::IAM::Group][2], [
3223
- # AWS::IAM::InstanceProfile][3], [ AWS::IAM::Policy][4], [
3224
- # AWS::IAM::Role][5], [ AWS::IAM::User][6], and [
3225
- # AWS::IAM::UserToGroupAddition][7]. If your stack template contains
3226
- # these resources, we recommend that you review all permissions
3227
- # associated with them and edit their permissions if necessary.
3271
+ # * `CAPABILITY_IAM` and `CAPABILITY_NAMED_IAM`
3228
3272
  #
3229
- # If you have IAM resources, you can specify either capability. If you
3230
- # have IAM resources with custom names, you must specify
3231
- # `CAPABILITY_NAMED_IAM`. If you don't specify this parameter, this
3232
- # action returns an `InsufficientCapabilities` error.
3273
+ # Some stack templates might include resources that can affect
3274
+ # permissions in your AWS account; for example, by creating new AWS
3275
+ # Identity and Access Management (IAM) users. For those stacks, you
3276
+ # must explicitly acknowledge this by specifying one of these
3277
+ # capabilities.
3233
3278
  #
3234
- # For more information, see [Acknowledging IAM Resources in AWS
3235
- # CloudFormation Templates][8].
3279
+ # The following IAM resources require you to specify either the
3280
+ # `CAPABILITY_IAM` or `CAPABILITY_NAMED_IAM` capability.
3281
+ #
3282
+ # * If you have IAM resources, you can specify either capability.
3283
+ #
3284
+ # * If you have IAM resources with custom names, you *must* specify
3285
+ # `CAPABILITY_NAMED_IAM`.
3286
+ #
3287
+ # * If you don't specify either of these capabilities, AWS
3288
+ # CloudFormation returns an `InsufficientCapabilities` error.
3289
+ #
3290
+ # If your stack template contains these resources, we recommend that
3291
+ # you review all permissions associated with them and edit their
3292
+ # permissions if necessary.
3293
+ #
3294
+ # * [ AWS::IAM::AccessKey][1]
3295
+ #
3296
+ # * [ AWS::IAM::Group][2]
3297
+ #
3298
+ # * [ AWS::IAM::InstanceProfile][3]
3299
+ #
3300
+ # * [ AWS::IAM::Policy][4]
3301
+ #
3302
+ # * [ AWS::IAM::Role][5]
3303
+ #
3304
+ # * [ AWS::IAM::User][6]
3305
+ #
3306
+ # * [ AWS::IAM::UserToGroupAddition][7]
3307
+ #
3308
+ # For more information, see [Acknowledging IAM Resources in AWS
3309
+ # CloudFormation Templates][8].
3310
+ #
3311
+ # * `CAPABILITY_AUTO_EXPAND`
3312
+ #
3313
+ # Some template contain macros. Macros perform custom processing on
3314
+ # templates; this can include simple actions like find-and-replace
3315
+ # operations, all the way to extensive transformations of entire
3316
+ # templates. Because of this, users typically create a change set from
3317
+ # the processed template, so that they can review the changes
3318
+ # resulting from the macros before actually updating the stack. If
3319
+ # your stack template contains one or more macros, and you choose to
3320
+ # update a stack directly from the processed template, without first
3321
+ # reviewing the resulting changes in a change set, you must
3322
+ # acknowledge this capability. This includes the [AWS::Include][9] and
3323
+ # [AWS::Serverless][10] transforms, which are macros hosted by AWS
3324
+ # CloudFormation.
3325
+ #
3326
+ # Change sets do not currently support nested stacks. If you want to
3327
+ # update a stack from a stack template that contains macros *and*
3328
+ # nested stacks, you must update the stack directly from the template
3329
+ # using this capability.
3330
+ #
3331
+ # You should only update stacks directly from a stack template that
3332
+ # contains macros if you know what processing the macro performs.
3333
+ #
3334
+ # Each macro relies on an underlying Lambda service function for
3335
+ # processing stack templates. Be aware that the Lambda function owner
3336
+ # can update the function operation without AWS CloudFormation being
3337
+ # notified.
3338
+ #
3339
+ # For more information, see [Using AWS CloudFormation Macros to
3340
+ # Perform Custom Processing on Templates][11].
3236
3341
  #
3237
3342
  #
3238
3343
  #
@@ -3243,7 +3348,10 @@ module Aws::CloudFormation
3243
3348
  # [5]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html
3244
3349
  # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
3245
3350
  # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
3246
- # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
3351
+ # [8]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
3352
+ # [9]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
3353
+ # [10]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
3354
+ # [11]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
3247
3355
  #
3248
3356
  # @option params [Array<String>] :resource_types
3249
3357
  # The template resource types that you have permissions to work with for
@@ -3357,7 +3465,7 @@ module Aws::CloudFormation
3357
3465
  # resolved_value: "ParameterValue",
3358
3466
  # },
3359
3467
  # ],
3360
- # capabilities: ["CAPABILITY_IAM"], # accepts CAPABILITY_IAM, CAPABILITY_NAMED_IAM
3468
+ # capabilities: ["CAPABILITY_IAM"], # accepts CAPABILITY_IAM, CAPABILITY_NAMED_IAM, CAPABILITY_AUTO_EXPAND
3361
3469
  # resource_types: ["ResourceType"],
3362
3470
  # role_arn: "RoleARN",
3363
3471
  # rollback_configuration: {
@@ -3776,7 +3884,7 @@ module Aws::CloudFormation
3776
3884
  # resolved_value: "ParameterValue",
3777
3885
  # },
3778
3886
  # ],
3779
- # capabilities: ["CAPABILITY_IAM"], # accepts CAPABILITY_IAM, CAPABILITY_NAMED_IAM
3887
+ # capabilities: ["CAPABILITY_IAM"], # accepts CAPABILITY_IAM, CAPABILITY_NAMED_IAM, CAPABILITY_AUTO_EXPAND
3780
3888
  # tags: [
3781
3889
  # {
3782
3890
  # key: "TagKey", # required
@@ -3907,7 +4015,7 @@ module Aws::CloudFormation
3907
4015
  # resp.parameters[0].description #=> String
3908
4016
  # resp.description #=> String
3909
4017
  # resp.capabilities #=> Array
3910
- # resp.capabilities[0] #=> String, one of "CAPABILITY_IAM", "CAPABILITY_NAMED_IAM"
4018
+ # resp.capabilities[0] #=> String, one of "CAPABILITY_IAM", "CAPABILITY_NAMED_IAM", "CAPABILITY_AUTO_EXPAND"
3911
4019
  # resp.capabilities_reason #=> String
3912
4020
  # resp.declared_transforms #=> Array
3913
4021
  # resp.declared_transforms[0] #=> String
@@ -3934,7 +4042,7 @@ module Aws::CloudFormation
3934
4042
  params: params,
3935
4043
  config: config)
3936
4044
  context[:gem_name] = 'aws-sdk-cloudformation'
3937
- context[:gem_version] = '1.11.1'
4045
+ context[:gem_version] = '1.12.0'
3938
4046
  Seahorse::Client::Request.new(handlers, context)
3939
4047
  end
3940
4048
 
@@ -47,7 +47,7 @@ module Aws::CloudFormation
47
47
  # },
48
48
  # timeout_in_minutes: 1,
49
49
  # notification_arns: ["NotificationARN"],
50
- # capabilities: ["CAPABILITY_IAM"], # accepts CAPABILITY_IAM, CAPABILITY_NAMED_IAM
50
+ # capabilities: ["CAPABILITY_IAM"], # accepts CAPABILITY_IAM, CAPABILITY_NAMED_IAM, CAPABILITY_AUTO_EXPAND
51
51
  # resource_types: ["ResourceType"],
52
52
  # role_arn: "RoleARN",
53
53
  # on_failure: "DO_NOTHING", # accepts DO_NOTHING, ROLLBACK, DELETE
@@ -121,29 +121,80 @@ module Aws::CloudFormation
121
121
  # related events. You can find your SNS topic ARNs using the SNS console
122
122
  # or your Command Line Interface (CLI).
123
123
  # @option options [Array<String>] :capabilities
124
- # A list of values that you must specify before AWS CloudFormation can
125
- # create certain stacks. Some stack templates might include resources
126
- # that can affect permissions in your AWS account, for example, by
127
- # creating new AWS Identity and Access Management (IAM) users. For those
128
- # stacks, you must explicitly acknowledge their capabilities by
129
- # specifying this parameter.
124
+ # In some cases, you must explicity acknowledge that your stack template
125
+ # contains certain capabilities in order for AWS CloudFormation to
126
+ # create the stack.
130
127
  #
131
- # The only valid values are `CAPABILITY_IAM` and `CAPABILITY_NAMED_IAM`.
132
- # The following resources require you to specify this parameter: [
133
- # AWS::IAM::AccessKey][1], [ AWS::IAM::Group][2], [
134
- # AWS::IAM::InstanceProfile][3], [ AWS::IAM::Policy][4], [
135
- # AWS::IAM::Role][5], [ AWS::IAM::User][6], and [
136
- # AWS::IAM::UserToGroupAddition][7]. If your stack template contains
137
- # these resources, we recommend that you review all permissions
138
- # associated with them and edit their permissions if necessary.
128
+ # * `CAPABILITY_IAM` and `CAPABILITY_NAMED_IAM`
139
129
  #
140
- # If you have IAM resources, you can specify either capability. If you
141
- # have IAM resources with custom names, you must specify
142
- # `CAPABILITY_NAMED_IAM`. If you don't specify this parameter, this
143
- # action returns an `InsufficientCapabilities` error.
130
+ # Some stack templates might include resources that can affect
131
+ # permissions in your AWS account; for example, by creating new AWS
132
+ # Identity and Access Management (IAM) users. For those stacks, you
133
+ # must explicitly acknowledge this by specifying one of these
134
+ # capabilities.
144
135
  #
145
- # For more information, see [Acknowledging IAM Resources in AWS
146
- # CloudFormation Templates][8].
136
+ # The following IAM resources require you to specify either the
137
+ # `CAPABILITY_IAM` or `CAPABILITY_NAMED_IAM` capability.
138
+ #
139
+ # * If you have IAM resources, you can specify either capability.
140
+ #
141
+ # * If you have IAM resources with custom names, you *must* specify
142
+ # `CAPABILITY_NAMED_IAM`.
143
+ #
144
+ # * If you don't specify either of these capabilities, AWS
145
+ # CloudFormation returns an `InsufficientCapabilities` error.
146
+ #
147
+ # If your stack template contains these resources, we recommend that
148
+ # you review all permissions associated with them and edit their
149
+ # permissions if necessary.
150
+ #
151
+ # * [ AWS::IAM::AccessKey][1]
152
+ #
153
+ # * [ AWS::IAM::Group][2]
154
+ #
155
+ # * [ AWS::IAM::InstanceProfile][3]
156
+ #
157
+ # * [ AWS::IAM::Policy][4]
158
+ #
159
+ # * [ AWS::IAM::Role][5]
160
+ #
161
+ # * [ AWS::IAM::User][6]
162
+ #
163
+ # * [ AWS::IAM::UserToGroupAddition][7]
164
+ #
165
+ # For more information, see [Acknowledging IAM Resources in AWS
166
+ # CloudFormation Templates][8].
167
+ #
168
+ # * `CAPABILITY_AUTO_EXPAND`
169
+ #
170
+ # Some template contain macros. Macros perform custom processing on
171
+ # templates; this can include simple actions like find-and-replace
172
+ # operations, all the way to extensive transformations of entire
173
+ # templates. Because of this, users typically create a change set from
174
+ # the processed template, so that they can review the changes
175
+ # resulting from the macros before actually creating the stack. If
176
+ # your stack template contains one or more macros, and you choose to
177
+ # create a stack directly from the processed template, without first
178
+ # reviewing the resulting changes in a change set, you must
179
+ # acknowledge this capability. This includes the [AWS::Include][9] and
180
+ # [AWS::Serverless][10] transforms, which are macros hosted by AWS
181
+ # CloudFormation.
182
+ #
183
+ # Change sets do not currently support nested stacks. If you want to
184
+ # create a stack from a stack template that contains macros *and*
185
+ # nested stacks, you must create the stack directly from the template
186
+ # using this capability.
187
+ #
188
+ # You should only create stacks directly from a stack template that
189
+ # contains macros if you know what processing the macro performs.
190
+ #
191
+ # Each macro relies on an underlying Lambda service function for
192
+ # processing stack templates. Be aware that the Lambda function owner
193
+ # can update the function operation without AWS CloudFormation being
194
+ # notified.
195
+ #
196
+ # For more information, see [Using AWS CloudFormation Macros to
197
+ # Perform Custom Processing on Templates][11].
147
198
  #
148
199
  #
149
200
  #
@@ -154,7 +205,10 @@ module Aws::CloudFormation
154
205
  # [5]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html
155
206
  # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
156
207
  # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
157
- # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
208
+ # [8]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
209
+ # [9]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
210
+ # [10]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
211
+ # [11]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
158
212
  # @option options [Array<String>] :resource_types
159
213
  # The template resource types that you have permissions to work with for
160
214
  # this create stack action, such as `AWS::EC2::Instance`, `AWS::EC2::*`,
@@ -410,7 +410,7 @@ module Aws::CloudFormation
410
410
  # },
411
411
  # timeout_in_minutes: 1,
412
412
  # notification_arns: ["NotificationARN"],
413
- # capabilities: ["CAPABILITY_IAM"], # accepts CAPABILITY_IAM, CAPABILITY_NAMED_IAM
413
+ # capabilities: ["CAPABILITY_IAM"], # accepts CAPABILITY_IAM, CAPABILITY_NAMED_IAM, CAPABILITY_AUTO_EXPAND
414
414
  # resource_types: ["ResourceType"],
415
415
  # role_arn: "RoleARN",
416
416
  # on_failure: "DO_NOTHING", # accepts DO_NOTHING, ROLLBACK, DELETE
@@ -475,29 +475,80 @@ module Aws::CloudFormation
475
475
  # related events. You can find your SNS topic ARNs using the SNS console
476
476
  # or your Command Line Interface (CLI).
477
477
  # @option options [Array<String>] :capabilities
478
- # A list of values that you must specify before AWS CloudFormation can
479
- # create certain stacks. Some stack templates might include resources
480
- # that can affect permissions in your AWS account, for example, by
481
- # creating new AWS Identity and Access Management (IAM) users. For those
482
- # stacks, you must explicitly acknowledge their capabilities by
483
- # specifying this parameter.
478
+ # In some cases, you must explicity acknowledge that your stack template
479
+ # contains certain capabilities in order for AWS CloudFormation to
480
+ # create the stack.
484
481
  #
485
- # The only valid values are `CAPABILITY_IAM` and `CAPABILITY_NAMED_IAM`.
486
- # The following resources require you to specify this parameter: [
487
- # AWS::IAM::AccessKey][1], [ AWS::IAM::Group][2], [
488
- # AWS::IAM::InstanceProfile][3], [ AWS::IAM::Policy][4], [
489
- # AWS::IAM::Role][5], [ AWS::IAM::User][6], and [
490
- # AWS::IAM::UserToGroupAddition][7]. If your stack template contains
491
- # these resources, we recommend that you review all permissions
492
- # associated with them and edit their permissions if necessary.
482
+ # * `CAPABILITY_IAM` and `CAPABILITY_NAMED_IAM`
493
483
  #
494
- # If you have IAM resources, you can specify either capability. If you
495
- # have IAM resources with custom names, you must specify
496
- # `CAPABILITY_NAMED_IAM`. If you don't specify this parameter, this
497
- # action returns an `InsufficientCapabilities` error.
484
+ # Some stack templates might include resources that can affect
485
+ # permissions in your AWS account; for example, by creating new AWS
486
+ # Identity and Access Management (IAM) users. For those stacks, you
487
+ # must explicitly acknowledge this by specifying one of these
488
+ # capabilities.
498
489
  #
499
- # For more information, see [Acknowledging IAM Resources in AWS
500
- # CloudFormation Templates][8].
490
+ # The following IAM resources require you to specify either the
491
+ # `CAPABILITY_IAM` or `CAPABILITY_NAMED_IAM` capability.
492
+ #
493
+ # * If you have IAM resources, you can specify either capability.
494
+ #
495
+ # * If you have IAM resources with custom names, you *must* specify
496
+ # `CAPABILITY_NAMED_IAM`.
497
+ #
498
+ # * If you don't specify either of these capabilities, AWS
499
+ # CloudFormation returns an `InsufficientCapabilities` error.
500
+ #
501
+ # If your stack template contains these resources, we recommend that
502
+ # you review all permissions associated with them and edit their
503
+ # permissions if necessary.
504
+ #
505
+ # * [ AWS::IAM::AccessKey][1]
506
+ #
507
+ # * [ AWS::IAM::Group][2]
508
+ #
509
+ # * [ AWS::IAM::InstanceProfile][3]
510
+ #
511
+ # * [ AWS::IAM::Policy][4]
512
+ #
513
+ # * [ AWS::IAM::Role][5]
514
+ #
515
+ # * [ AWS::IAM::User][6]
516
+ #
517
+ # * [ AWS::IAM::UserToGroupAddition][7]
518
+ #
519
+ # For more information, see [Acknowledging IAM Resources in AWS
520
+ # CloudFormation Templates][8].
521
+ #
522
+ # * `CAPABILITY_AUTO_EXPAND`
523
+ #
524
+ # Some template contain macros. Macros perform custom processing on
525
+ # templates; this can include simple actions like find-and-replace
526
+ # operations, all the way to extensive transformations of entire
527
+ # templates. Because of this, users typically create a change set from
528
+ # the processed template, so that they can review the changes
529
+ # resulting from the macros before actually creating the stack. If
530
+ # your stack template contains one or more macros, and you choose to
531
+ # create a stack directly from the processed template, without first
532
+ # reviewing the resulting changes in a change set, you must
533
+ # acknowledge this capability. This includes the [AWS::Include][9] and
534
+ # [AWS::Serverless][10] transforms, which are macros hosted by AWS
535
+ # CloudFormation.
536
+ #
537
+ # Change sets do not currently support nested stacks. If you want to
538
+ # create a stack from a stack template that contains macros *and*
539
+ # nested stacks, you must create the stack directly from the template
540
+ # using this capability.
541
+ #
542
+ # You should only create stacks directly from a stack template that
543
+ # contains macros if you know what processing the macro performs.
544
+ #
545
+ # Each macro relies on an underlying Lambda service function for
546
+ # processing stack templates. Be aware that the Lambda function owner
547
+ # can update the function operation without AWS CloudFormation being
548
+ # notified.
549
+ #
550
+ # For more information, see [Using AWS CloudFormation Macros to
551
+ # Perform Custom Processing on Templates][11].
501
552
  #
502
553
  #
503
554
  #
@@ -508,7 +559,10 @@ module Aws::CloudFormation
508
559
  # [5]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html
509
560
  # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
510
561
  # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
511
- # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
562
+ # [8]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
563
+ # [9]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
564
+ # [10]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
565
+ # [11]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
512
566
  # @option options [Array<String>] :resource_types
513
567
  # The template resource types that you have permissions to work with for
514
568
  # this create stack action, such as `AWS::EC2::Instance`, `AWS::EC2::*`,
@@ -678,7 +732,7 @@ module Aws::CloudFormation
678
732
  # resolved_value: "ParameterValue",
679
733
  # },
680
734
  # ],
681
- # capabilities: ["CAPABILITY_IAM"], # accepts CAPABILITY_IAM, CAPABILITY_NAMED_IAM
735
+ # capabilities: ["CAPABILITY_IAM"], # accepts CAPABILITY_IAM, CAPABILITY_NAMED_IAM, CAPABILITY_AUTO_EXPAND
682
736
  # resource_types: ["ResourceType"],
683
737
  # role_arn: "RoleARN",
684
738
  # rollback_configuration: {
@@ -761,29 +815,80 @@ module Aws::CloudFormation
761
815
  #
762
816
  # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/APIReference/API_Parameter.html
763
817
  # @option options [Array<String>] :capabilities
764
- # A list of values that you must specify before AWS CloudFormation can
765
- # update certain stacks. Some stack templates might include resources
766
- # that can affect permissions in your AWS account, for example, by
767
- # creating new AWS Identity and Access Management (IAM) users. For those
768
- # stacks, you must explicitly acknowledge their capabilities by
769
- # specifying this parameter.
818
+ # In some cases, you must explicity acknowledge that your stack template
819
+ # contains certain capabilities in order for AWS CloudFormation to
820
+ # update the stack.
821
+ #
822
+ # * `CAPABILITY_IAM` and `CAPABILITY_NAMED_IAM`
823
+ #
824
+ # Some stack templates might include resources that can affect
825
+ # permissions in your AWS account; for example, by creating new AWS
826
+ # Identity and Access Management (IAM) users. For those stacks, you
827
+ # must explicitly acknowledge this by specifying one of these
828
+ # capabilities.
829
+ #
830
+ # The following IAM resources require you to specify either the
831
+ # `CAPABILITY_IAM` or `CAPABILITY_NAMED_IAM` capability.
832
+ #
833
+ # * If you have IAM resources, you can specify either capability.
834
+ #
835
+ # * If you have IAM resources with custom names, you *must* specify
836
+ # `CAPABILITY_NAMED_IAM`.
837
+ #
838
+ # * If you don't specify either of these capabilities, AWS
839
+ # CloudFormation returns an `InsufficientCapabilities` error.
840
+ #
841
+ # If your stack template contains these resources, we recommend that
842
+ # you review all permissions associated with them and edit their
843
+ # permissions if necessary.
844
+ #
845
+ # * [ AWS::IAM::AccessKey][1]
846
+ #
847
+ # * [ AWS::IAM::Group][2]
848
+ #
849
+ # * [ AWS::IAM::InstanceProfile][3]
850
+ #
851
+ # * [ AWS::IAM::Policy][4]
852
+ #
853
+ # * [ AWS::IAM::Role][5]
854
+ #
855
+ # * [ AWS::IAM::User][6]
856
+ #
857
+ # * [ AWS::IAM::UserToGroupAddition][7]
858
+ #
859
+ # For more information, see [Acknowledging IAM Resources in AWS
860
+ # CloudFormation Templates][8].
861
+ #
862
+ # * `CAPABILITY_AUTO_EXPAND`
863
+ #
864
+ # Some template contain macros. Macros perform custom processing on
865
+ # templates; this can include simple actions like find-and-replace
866
+ # operations, all the way to extensive transformations of entire
867
+ # templates. Because of this, users typically create a change set from
868
+ # the processed template, so that they can review the changes
869
+ # resulting from the macros before actually updating the stack. If
870
+ # your stack template contains one or more macros, and you choose to
871
+ # update a stack directly from the processed template, without first
872
+ # reviewing the resulting changes in a change set, you must
873
+ # acknowledge this capability. This includes the [AWS::Include][9] and
874
+ # [AWS::Serverless][10] transforms, which are macros hosted by AWS
875
+ # CloudFormation.
876
+ #
877
+ # Change sets do not currently support nested stacks. If you want to
878
+ # update a stack from a stack template that contains macros *and*
879
+ # nested stacks, you must update the stack directly from the template
880
+ # using this capability.
770
881
  #
771
- # The only valid values are `CAPABILITY_IAM` and `CAPABILITY_NAMED_IAM`.
772
- # The following resources require you to specify this parameter: [
773
- # AWS::IAM::AccessKey][1], [ AWS::IAM::Group][2], [
774
- # AWS::IAM::InstanceProfile][3], [ AWS::IAM::Policy][4], [
775
- # AWS::IAM::Role][5], [ AWS::IAM::User][6], and [
776
- # AWS::IAM::UserToGroupAddition][7]. If your stack template contains
777
- # these resources, we recommend that you review all permissions
778
- # associated with them and edit their permissions if necessary.
882
+ # You should only update stacks directly from a stack template that
883
+ # contains macros if you know what processing the macro performs.
779
884
  #
780
- # If you have IAM resources, you can specify either capability. If you
781
- # have IAM resources with custom names, you must specify
782
- # `CAPABILITY_NAMED_IAM`. If you don't specify this parameter, this
783
- # action returns an `InsufficientCapabilities` error.
885
+ # Each macro relies on an underlying Lambda service function for
886
+ # processing stack templates. Be aware that the Lambda function owner
887
+ # can update the function operation without AWS CloudFormation being
888
+ # notified.
784
889
  #
785
- # For more information, see [Acknowledging IAM Resources in AWS
786
- # CloudFormation Templates][8].
890
+ # For more information, see [Using AWS CloudFormation Macros to
891
+ # Perform Custom Processing on Templates][11].
787
892
  #
788
893
  #
789
894
  #
@@ -794,7 +899,10 @@ module Aws::CloudFormation
794
899
  # [5]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html
795
900
  # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
796
901
  # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
797
- # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
902
+ # [8]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
903
+ # [9]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
904
+ # [10]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
905
+ # [11]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
798
906
  # @option options [Array<String>] :resource_types
799
907
  # The template resource types that you have permissions to work with for
800
908
  # this update stack action, such as `AWS::EC2::Instance`, `AWS::EC2::*`,
@@ -332,7 +332,7 @@ module Aws::CloudFormation
332
332
  # resolved_value: "ParameterValue",
333
333
  # },
334
334
  # ],
335
- # capabilities: ["CAPABILITY_IAM"], # accepts CAPABILITY_IAM, CAPABILITY_NAMED_IAM
335
+ # capabilities: ["CAPABILITY_IAM"], # accepts CAPABILITY_IAM, CAPABILITY_NAMED_IAM, CAPABILITY_AUTO_EXPAND
336
336
  # resource_types: ["ResourceType"],
337
337
  # role_arn: "RoleARN",
338
338
  # rollback_configuration: {
@@ -591,7 +591,7 @@ module Aws::CloudFormation
591
591
  # },
592
592
  # timeout_in_minutes: 1,
593
593
  # notification_arns: ["NotificationARN"],
594
- # capabilities: ["CAPABILITY_IAM"], # accepts CAPABILITY_IAM, CAPABILITY_NAMED_IAM
594
+ # capabilities: ["CAPABILITY_IAM"], # accepts CAPABILITY_IAM, CAPABILITY_NAMED_IAM, CAPABILITY_AUTO_EXPAND
595
595
  # resource_types: ["ResourceType"],
596
596
  # role_arn: "RoleARN",
597
597
  # on_failure: "DO_NOTHING", # accepts DO_NOTHING, ROLLBACK, DELETE
@@ -681,30 +681,80 @@ module Aws::CloudFormation
681
681
  # @return [Array<String>]
682
682
  #
683
683
  # @!attribute [rw] capabilities
684
- # A list of values that you must specify before AWS CloudFormation can
685
- # create certain stacks. Some stack templates might include resources
686
- # that can affect permissions in your AWS account, for example, by
687
- # creating new AWS Identity and Access Management (IAM) users. For
688
- # those stacks, you must explicitly acknowledge their capabilities by
689
- # specifying this parameter.
684
+ # In some cases, you must explicity acknowledge that your stack
685
+ # template contains certain capabilities in order for AWS
686
+ # CloudFormation to create the stack.
690
687
  #
691
- # The only valid values are `CAPABILITY_IAM` and
692
- # `CAPABILITY_NAMED_IAM`. The following resources require you to
693
- # specify this parameter: [ AWS::IAM::AccessKey][1], [
694
- # AWS::IAM::Group][2], [ AWS::IAM::InstanceProfile][3], [
695
- # AWS::IAM::Policy][4], [ AWS::IAM::Role][5], [ AWS::IAM::User][6],
696
- # and [ AWS::IAM::UserToGroupAddition][7]. If your stack template
697
- # contains these resources, we recommend that you review all
698
- # permissions associated with them and edit their permissions if
699
- # necessary.
688
+ # * `CAPABILITY_IAM` and `CAPABILITY_NAMED_IAM`
700
689
  #
701
- # If you have IAM resources, you can specify either capability. If you
702
- # have IAM resources with custom names, you must specify
703
- # `CAPABILITY_NAMED_IAM`. If you don't specify this parameter, this
704
- # action returns an `InsufficientCapabilities` error.
690
+ # Some stack templates might include resources that can affect
691
+ # permissions in your AWS account; for example, by creating new AWS
692
+ # Identity and Access Management (IAM) users. For those stacks, you
693
+ # must explicitly acknowledge this by specifying one of these
694
+ # capabilities.
705
695
  #
706
- # For more information, see [Acknowledging IAM Resources in AWS
707
- # CloudFormation Templates][8].
696
+ # The following IAM resources require you to specify either the
697
+ # `CAPABILITY_IAM` or `CAPABILITY_NAMED_IAM` capability.
698
+ #
699
+ # * If you have IAM resources, you can specify either capability.
700
+ #
701
+ # * If you have IAM resources with custom names, you *must* specify
702
+ # `CAPABILITY_NAMED_IAM`.
703
+ #
704
+ # * If you don't specify either of these capabilities, AWS
705
+ # CloudFormation returns an `InsufficientCapabilities` error.
706
+ #
707
+ # If your stack template contains these resources, we recommend that
708
+ # you review all permissions associated with them and edit their
709
+ # permissions if necessary.
710
+ #
711
+ # * [ AWS::IAM::AccessKey][1]
712
+ #
713
+ # * [ AWS::IAM::Group][2]
714
+ #
715
+ # * [ AWS::IAM::InstanceProfile][3]
716
+ #
717
+ # * [ AWS::IAM::Policy][4]
718
+ #
719
+ # * [ AWS::IAM::Role][5]
720
+ #
721
+ # * [ AWS::IAM::User][6]
722
+ #
723
+ # * [ AWS::IAM::UserToGroupAddition][7]
724
+ #
725
+ # For more information, see [Acknowledging IAM Resources in AWS
726
+ # CloudFormation Templates][8].
727
+ #
728
+ # * `CAPABILITY_AUTO_EXPAND`
729
+ #
730
+ # Some template contain macros. Macros perform custom processing on
731
+ # templates; this can include simple actions like find-and-replace
732
+ # operations, all the way to extensive transformations of entire
733
+ # templates. Because of this, users typically create a change set
734
+ # from the processed template, so that they can review the changes
735
+ # resulting from the macros before actually creating the stack. If
736
+ # your stack template contains one or more macros, and you choose to
737
+ # create a stack directly from the processed template, without first
738
+ # reviewing the resulting changes in a change set, you must
739
+ # acknowledge this capability. This includes the [AWS::Include][9]
740
+ # and [AWS::Serverless][10] transforms, which are macros hosted by
741
+ # AWS CloudFormation.
742
+ #
743
+ # Change sets do not currently support nested stacks. If you want to
744
+ # create a stack from a stack template that contains macros *and*
745
+ # nested stacks, you must create the stack directly from the
746
+ # template using this capability.
747
+ #
748
+ # You should only create stacks directly from a stack template that
749
+ # contains macros if you know what processing the macro performs.
750
+ #
751
+ # Each macro relies on an underlying Lambda service function for
752
+ # processing stack templates. Be aware that the Lambda function
753
+ # owner can update the function operation without AWS CloudFormation
754
+ # being notified.
755
+ #
756
+ # For more information, see [Using AWS CloudFormation Macros to
757
+ # Perform Custom Processing on Templates][11].
708
758
  #
709
759
  #
710
760
  #
@@ -715,7 +765,10 @@ module Aws::CloudFormation
715
765
  # [5]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html
716
766
  # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
717
767
  # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
718
- # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
768
+ # [8]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
769
+ # [9]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
770
+ # [10]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
771
+ # [11]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
719
772
  # @return [Array<String>]
720
773
  #
721
774
  # @!attribute [rw] resource_types
@@ -1008,7 +1061,7 @@ module Aws::CloudFormation
1008
1061
  # resolved_value: "ParameterValue",
1009
1062
  # },
1010
1063
  # ],
1011
- # capabilities: ["CAPABILITY_IAM"], # accepts CAPABILITY_IAM, CAPABILITY_NAMED_IAM
1064
+ # capabilities: ["CAPABILITY_IAM"], # accepts CAPABILITY_IAM, CAPABILITY_NAMED_IAM, CAPABILITY_AUTO_EXPAND
1012
1065
  # tags: [
1013
1066
  # {
1014
1067
  # key: "TagKey", # required
@@ -5209,7 +5262,7 @@ module Aws::CloudFormation
5209
5262
  # resolved_value: "ParameterValue",
5210
5263
  # },
5211
5264
  # ],
5212
- # capabilities: ["CAPABILITY_IAM"], # accepts CAPABILITY_IAM, CAPABILITY_NAMED_IAM
5265
+ # capabilities: ["CAPABILITY_IAM"], # accepts CAPABILITY_IAM, CAPABILITY_NAMED_IAM, CAPABILITY_AUTO_EXPAND
5213
5266
  # resource_types: ["ResourceType"],
5214
5267
  # role_arn: "RoleARN",
5215
5268
  # rollback_configuration: {
@@ -5309,30 +5362,80 @@ module Aws::CloudFormation
5309
5362
  # @return [Array<Types::Parameter>]
5310
5363
  #
5311
5364
  # @!attribute [rw] capabilities
5312
- # A list of values that you must specify before AWS CloudFormation can
5313
- # update certain stacks. Some stack templates might include resources
5314
- # that can affect permissions in your AWS account, for example, by
5315
- # creating new AWS Identity and Access Management (IAM) users. For
5316
- # those stacks, you must explicitly acknowledge their capabilities by
5317
- # specifying this parameter.
5365
+ # In some cases, you must explicity acknowledge that your stack
5366
+ # template contains certain capabilities in order for AWS
5367
+ # CloudFormation to update the stack.
5318
5368
  #
5319
- # The only valid values are `CAPABILITY_IAM` and
5320
- # `CAPABILITY_NAMED_IAM`. The following resources require you to
5321
- # specify this parameter: [ AWS::IAM::AccessKey][1], [
5322
- # AWS::IAM::Group][2], [ AWS::IAM::InstanceProfile][3], [
5323
- # AWS::IAM::Policy][4], [ AWS::IAM::Role][5], [ AWS::IAM::User][6],
5324
- # and [ AWS::IAM::UserToGroupAddition][7]. If your stack template
5325
- # contains these resources, we recommend that you review all
5326
- # permissions associated with them and edit their permissions if
5327
- # necessary.
5369
+ # * `CAPABILITY_IAM` and `CAPABILITY_NAMED_IAM`
5328
5370
  #
5329
- # If you have IAM resources, you can specify either capability. If you
5330
- # have IAM resources with custom names, you must specify
5331
- # `CAPABILITY_NAMED_IAM`. If you don't specify this parameter, this
5332
- # action returns an `InsufficientCapabilities` error.
5371
+ # Some stack templates might include resources that can affect
5372
+ # permissions in your AWS account; for example, by creating new AWS
5373
+ # Identity and Access Management (IAM) users. For those stacks, you
5374
+ # must explicitly acknowledge this by specifying one of these
5375
+ # capabilities.
5333
5376
  #
5334
- # For more information, see [Acknowledging IAM Resources in AWS
5335
- # CloudFormation Templates][8].
5377
+ # The following IAM resources require you to specify either the
5378
+ # `CAPABILITY_IAM` or `CAPABILITY_NAMED_IAM` capability.
5379
+ #
5380
+ # * If you have IAM resources, you can specify either capability.
5381
+ #
5382
+ # * If you have IAM resources with custom names, you *must* specify
5383
+ # `CAPABILITY_NAMED_IAM`.
5384
+ #
5385
+ # * If you don't specify either of these capabilities, AWS
5386
+ # CloudFormation returns an `InsufficientCapabilities` error.
5387
+ #
5388
+ # If your stack template contains these resources, we recommend that
5389
+ # you review all permissions associated with them and edit their
5390
+ # permissions if necessary.
5391
+ #
5392
+ # * [ AWS::IAM::AccessKey][1]
5393
+ #
5394
+ # * [ AWS::IAM::Group][2]
5395
+ #
5396
+ # * [ AWS::IAM::InstanceProfile][3]
5397
+ #
5398
+ # * [ AWS::IAM::Policy][4]
5399
+ #
5400
+ # * [ AWS::IAM::Role][5]
5401
+ #
5402
+ # * [ AWS::IAM::User][6]
5403
+ #
5404
+ # * [ AWS::IAM::UserToGroupAddition][7]
5405
+ #
5406
+ # For more information, see [Acknowledging IAM Resources in AWS
5407
+ # CloudFormation Templates][8].
5408
+ #
5409
+ # * `CAPABILITY_AUTO_EXPAND`
5410
+ #
5411
+ # Some template contain macros. Macros perform custom processing on
5412
+ # templates; this can include simple actions like find-and-replace
5413
+ # operations, all the way to extensive transformations of entire
5414
+ # templates. Because of this, users typically create a change set
5415
+ # from the processed template, so that they can review the changes
5416
+ # resulting from the macros before actually updating the stack. If
5417
+ # your stack template contains one or more macros, and you choose to
5418
+ # update a stack directly from the processed template, without first
5419
+ # reviewing the resulting changes in a change set, you must
5420
+ # acknowledge this capability. This includes the [AWS::Include][9]
5421
+ # and [AWS::Serverless][10] transforms, which are macros hosted by
5422
+ # AWS CloudFormation.
5423
+ #
5424
+ # Change sets do not currently support nested stacks. If you want to
5425
+ # update a stack from a stack template that contains macros *and*
5426
+ # nested stacks, you must update the stack directly from the
5427
+ # template using this capability.
5428
+ #
5429
+ # You should only update stacks directly from a stack template that
5430
+ # contains macros if you know what processing the macro performs.
5431
+ #
5432
+ # Each macro relies on an underlying Lambda service function for
5433
+ # processing stack templates. Be aware that the Lambda function
5434
+ # owner can update the function operation without AWS CloudFormation
5435
+ # being notified.
5436
+ #
5437
+ # For more information, see [Using AWS CloudFormation Macros to
5438
+ # Perform Custom Processing on Templates][11].
5336
5439
  #
5337
5440
  #
5338
5441
  #
@@ -5343,7 +5446,10 @@ module Aws::CloudFormation
5343
5446
  # [5]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html
5344
5447
  # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
5345
5448
  # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
5346
- # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
5449
+ # [8]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
5450
+ # [9]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
5451
+ # [10]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
5452
+ # [11]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
5347
5453
  # @return [Array<String>]
5348
5454
  #
5349
5455
  # @!attribute [rw] resource_types
@@ -5633,7 +5739,7 @@ module Aws::CloudFormation
5633
5739
  # resolved_value: "ParameterValue",
5634
5740
  # },
5635
5741
  # ],
5636
- # capabilities: ["CAPABILITY_IAM"], # accepts CAPABILITY_IAM, CAPABILITY_NAMED_IAM
5742
+ # capabilities: ["CAPABILITY_IAM"], # accepts CAPABILITY_IAM, CAPABILITY_NAMED_IAM, CAPABILITY_AUTO_EXPAND
5637
5743
  # tags: [
5638
5744
  # {
5639
5745
  # key: "TagKey", # required
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-cloudformation
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.11.1
4
+ version: 1.12.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2018-11-16 00:00:00.000000000 Z
11
+ date: 2018-11-19 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core