aws-sdk-cloudformation 1.13.0 → 1.14.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: efc9f6e59034c0f6327403c04e3b158872a1ec88
4
- data.tar.gz: 0dae87a73009f6151eed04b55b4587ab7a4b463a
3
+ metadata.gz: d73d3c8c5d3c76eed67107c6f5ccfc73865bd9e4
4
+ data.tar.gz: 3a91931755163abe31bebca476184df3b1b2751c
5
5
  SHA512:
6
- metadata.gz: b113943565f6c65a7de970621330ca26a0df9ace3aebd7f45342580d09ad07811d59bac76f09b32cb56f95c6b94fbb0978caacd659204cc462ca403c96b9e9fc
7
- data.tar.gz: a43d9b6876b3fdd1f4edec5b4acbb3d068a1f2c35c96c846a4dfe05c09a9782879eb33225123a1c82761c3ee9dca75e7162bd1df3909ad2bf8ad1dd4521abbfe
6
+ metadata.gz: 75a76b10f9e197f37f2659d2f9b7bd452126b58ca6d5f58d4c7a9382ce82e12bc5ea9c65d0ae3e7a2d3c073ea8bb38bbb5f956a98e4a4c07637e034a0c73c8ba
7
+ data.tar.gz: 92e9c340e6ccb19ced905a139e4e6b768301fe6466901d751d9970f3ed297974146a79ca154437feac84e2a8b1bfb0f9a354846dc148e4ed8174a23a21dce548
@@ -47,6 +47,6 @@ require_relative 'aws-sdk-cloudformation/customizations'
47
47
  # @service
48
48
  module Aws::CloudFormation
49
49
 
50
- GEM_VERSION = '1.13.0'
50
+ GEM_VERSION = '1.14.0'
51
51
 
52
52
  end
@@ -412,29 +412,78 @@ module Aws::CloudFormation
412
412
  # change set. For more information, see the Parameter data type.
413
413
  #
414
414
  # @option params [Array<String>] :capabilities
415
- # A list of values that you must specify before AWS CloudFormation can
416
- # update certain stacks. Some stack templates might include resources
417
- # that can affect permissions in your AWS account, for example, by
418
- # creating new AWS Identity and Access Management (IAM) users. For those
419
- # stacks, you must explicitly acknowledge their capabilities by
420
- # specifying this parameter.
415
+ # In some cases, you must explicity acknowledge that your stack template
416
+ # contains certain capabilities in order for AWS CloudFormation to
417
+ # create the stack.
418
+ #
419
+ # * `CAPABILITY_IAM` and `CAPABILITY_NAMED_IAM`
420
+ #
421
+ # Some stack templates might include resources that can affect
422
+ # permissions in your AWS account; for example, by creating new AWS
423
+ # Identity and Access Management (IAM) users. For those stacks, you
424
+ # must explicitly acknowledge this by specifying one of these
425
+ # capabilities.
426
+ #
427
+ # The following IAM resources require you to specify either the
428
+ # `CAPABILITY_IAM` or `CAPABILITY_NAMED_IAM` capability.
429
+ #
430
+ # * If you have IAM resources, you can specify either capability.
431
+ #
432
+ # * If you have IAM resources with custom names, you *must* specify
433
+ # `CAPABILITY_NAMED_IAM`.
434
+ #
435
+ # * If you don't specify either of these capabilities, AWS
436
+ # CloudFormation returns an `InsufficientCapabilities` error.
437
+ #
438
+ # If your stack template contains these resources, we recommend that
439
+ # you review all permissions associated with them and edit their
440
+ # permissions if necessary.
441
+ #
442
+ # * [ AWS::IAM::AccessKey][1]
421
443
  #
422
- # The only valid values are `CAPABILITY_IAM` and `CAPABILITY_NAMED_IAM`.
423
- # The following resources require you to specify this parameter: [
424
- # AWS::IAM::AccessKey][1], [ AWS::IAM::Group][2], [
425
- # AWS::IAM::InstanceProfile][3], [ AWS::IAM::Policy][4], [
426
- # AWS::IAM::Role][5], [ AWS::IAM::User][6], and [
427
- # AWS::IAM::UserToGroupAddition][7]. If your stack template contains
428
- # these resources, we recommend that you review all permissions
429
- # associated with them and edit their permissions if necessary.
444
+ # * [ AWS::IAM::Group][2]
430
445
  #
431
- # If you have IAM resources, you can specify either capability. If you
432
- # have IAM resources with custom names, you must specify
433
- # `CAPABILITY_NAMED_IAM`. If you don't specify this parameter, this
434
- # action returns an `InsufficientCapabilities` error.
446
+ # * [ AWS::IAM::InstanceProfile][3]
435
447
  #
436
- # For more information, see [Acknowledging IAM Resources in AWS
437
- # CloudFormation Templates][8].
448
+ # * [ AWS::IAM::Policy][4]
449
+ #
450
+ # * [ AWS::IAM::Role][5]
451
+ #
452
+ # * [ AWS::IAM::User][6]
453
+ #
454
+ # * [ AWS::IAM::UserToGroupAddition][7]
455
+ #
456
+ # For more information, see [Acknowledging IAM Resources in AWS
457
+ # CloudFormation Templates][8].
458
+ #
459
+ # * `CAPABILITY_AUTO_EXPAND`
460
+ #
461
+ # Some template contain macros. Macros perform custom processing on
462
+ # templates; this can include simple actions like find-and-replace
463
+ # operations, all the way to extensive transformations of entire
464
+ # templates. Because of this, users typically create a change set from
465
+ # the processed template, so that they can review the changes
466
+ # resulting from the macros before actually creating the stack. If
467
+ # your stack template contains one or more macros, and you choose to
468
+ # create a stack directly from the processed template, without first
469
+ # reviewing the resulting changes in a change set, you must
470
+ # acknowledge this capability. This includes the [AWS::Include][9] and
471
+ # [AWS::Serverless][10] transforms, which are macros hosted by AWS
472
+ # CloudFormation.
473
+ #
474
+ # <note markdown="1"> This capacity does not apply to creating change sets, and specifying
475
+ # it when creating change sets has no effect.
476
+ #
477
+ # Also, change sets do not currently support nested stacks. If you
478
+ # want to create a stack from a stack template that contains macros
479
+ # *and* nested stacks, you must create or update the stack directly
480
+ # from the template using the CreateStack or UpdateStack action, and
481
+ # specifying this capability.
482
+ #
483
+ # </note>
484
+ #
485
+ # For more information on macros, see [Using AWS CloudFormation Macros
486
+ # to Perform Custom Processing on Templates][11].
438
487
  #
439
488
  #
440
489
  #
@@ -446,6 +495,9 @@ module Aws::CloudFormation
446
495
  # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
447
496
  # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
448
497
  # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
498
+ # [9]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
499
+ # [10]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
500
+ # [11]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
449
501
  #
450
502
  # @option params [Array<String>] :resource_types
451
503
  # The template resource types that you have permissions to work with if
@@ -743,10 +795,10 @@ module Aws::CloudFormation
743
795
  # [5]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html
744
796
  # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
745
797
  # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
746
- # [8]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
747
- # [9]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
748
- # [10]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
749
- # [11]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
798
+ # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
799
+ # [9]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
800
+ # [10]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
801
+ # [11]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
750
802
  #
751
803
  # @option params [Array<String>] :resource_types
752
804
  # The template resource types that you have permissions to work with for
@@ -1072,45 +1124,80 @@ module Aws::CloudFormation
1072
1124
  # The input parameters for the stack set template.
1073
1125
  #
1074
1126
  # @option params [Array<String>] :capabilities
1075
- # A list of values that you must specify before AWS CloudFormation can
1076
- # create certain stack sets. Some stack set templates might include
1077
- # resources that can affect permissions in your AWS account—for example,
1078
- # by creating new AWS Identity and Access Management (IAM) users. For
1079
- # those stack sets, you must explicitly acknowledge their capabilities
1080
- # by specifying this parameter.
1127
+ # In some cases, you must explicity acknowledge that your stack set
1128
+ # template contains certain capabilities in order for AWS CloudFormation
1129
+ # to create the stack set and related stack instances.
1130
+ #
1131
+ # * `CAPABILITY_IAM` and `CAPABILITY_NAMED_IAM`
1132
+ #
1133
+ # Some stack templates might include resources that can affect
1134
+ # permissions in your AWS account; for example, by creating new AWS
1135
+ # Identity and Access Management (IAM) users. For those stack sets,
1136
+ # you must explicitly acknowledge this by specifying one of these
1137
+ # capabilities.
1138
+ #
1139
+ # The following IAM resources require you to specify either the
1140
+ # `CAPABILITY_IAM` or `CAPABILITY_NAMED_IAM` capability.
1141
+ #
1142
+ # * If you have IAM resources, you can specify either capability.
1081
1143
  #
1082
- # The only valid values are CAPABILITY\_IAM and CAPABILITY\_NAMED\_IAM.
1083
- # The following resources require you to specify this parameter:
1144
+ # * If you have IAM resources with custom names, you *must* specify
1145
+ # `CAPABILITY_NAMED_IAM`.
1146
+ #
1147
+ # * If you don't specify either of these capabilities, AWS
1148
+ # CloudFormation returns an `InsufficientCapabilities` error.
1149
+ #
1150
+ # If your stack template contains these resources, we recommend that
1151
+ # you review all permissions associated with them and edit their
1152
+ # permissions if necessary.
1084
1153
  #
1085
- # * AWS::IAM::AccessKey
1154
+ # * [ AWS::IAM::AccessKey][1]
1086
1155
  #
1087
- # * AWS::IAM::Group
1156
+ # * [ AWS::IAM::Group][2]
1088
1157
  #
1089
- # * AWS::IAM::InstanceProfile
1158
+ # * [ AWS::IAM::InstanceProfile][3]
1090
1159
  #
1091
- # * AWS::IAM::Policy
1160
+ # * [ AWS::IAM::Policy][4]
1092
1161
  #
1093
- # * AWS::IAM::Role
1162
+ # * [ AWS::IAM::Role][5]
1163
+ #
1164
+ # * [ AWS::IAM::User][6]
1165
+ #
1166
+ # * [ AWS::IAM::UserToGroupAddition][7]
1094
1167
  #
1095
- # * AWS::IAM::User
1168
+ # For more information, see [Acknowledging IAM Resources in AWS
1169
+ # CloudFormation Templates][8].
1096
1170
  #
1097
- # * AWS::IAM::UserToGroupAddition
1171
+ # * `CAPABILITY_AUTO_EXPAND`
1098
1172
  #
1099
- # If your stack template contains these resources, we recommend that you
1100
- # review all permissions that are associated with them and edit their
1101
- # permissions if necessary.
1173
+ # Some templates contain macros. If your stack template contains one
1174
+ # or more macros, and you choose to create a stack directly from the
1175
+ # processed template, without first reviewing the resulting changes in
1176
+ # a change set, you must acknowledge this capability. For more
1177
+ # information, see [Using AWS CloudFormation Macros to Perform Custom
1178
+ # Processing on Templates][9].
1102
1179
  #
1103
- # If you have IAM resources, you can specify either capability. If you
1104
- # have IAM resources with custom names, you must specify
1105
- # CAPABILITY\_NAMED\_IAM. If you don't specify this parameter, this
1106
- # action returns an `InsufficientCapabilities` error.
1180
+ # <note markdown="1"> Stack sets do not currently support macros in stack templates. (This
1181
+ # includes the [AWS::Include][10] and [AWS::Serverless][11]
1182
+ # transforms, which are macros hosted by AWS CloudFormation.) Even if
1183
+ # you specify this capability, if you include a macro in your template
1184
+ # the stack set operation will fail.
1107
1185
  #
1108
- # For more information, see [Acknowledging IAM Resources in AWS
1109
- # CloudFormation Templates.][1]
1186
+ # </note>
1110
1187
  #
1111
1188
  #
1112
1189
  #
1113
- # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
1190
+ # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-accesskey.html
1191
+ # [2]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-group.html
1192
+ # [3]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-instanceprofile.html
1193
+ # [4]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-policy.html
1194
+ # [5]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html
1195
+ # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
1196
+ # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
1197
+ # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
1198
+ # [9]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
1199
+ # [10]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
1200
+ # [11]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
1114
1201
  #
1115
1202
  # @option params [Array<Types::Tag>] :tags
1116
1203
  # The key-value pairs to associate with this stack set and the stacks
@@ -3354,10 +3441,10 @@ module Aws::CloudFormation
3354
3441
  # [5]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html
3355
3442
  # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
3356
3443
  # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
3357
- # [8]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
3358
- # [9]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
3359
- # [10]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
3360
- # [11]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
3444
+ # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
3445
+ # [9]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
3446
+ # [10]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
3447
+ # [11]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
3361
3448
  #
3362
3449
  # @option params [Array<String>] :resource_types
3363
3450
  # The template resource types that you have permissions to work with for
@@ -3705,45 +3792,78 @@ module Aws::CloudFormation
3705
3792
  # A list of input parameters for the stack set template.
3706
3793
  #
3707
3794
  # @option params [Array<String>] :capabilities
3708
- # A list of values that you must specify before AWS CloudFormation can
3709
- # create certain stack sets. Some stack set templates might include
3710
- # resources that can affect permissions in your AWS account—for example,
3711
- # by creating new AWS Identity and Access Management (IAM) users. For
3712
- # those stack sets, you must explicitly acknowledge their capabilities
3713
- # by specifying this parameter.
3795
+ # In some cases, you must explicity acknowledge that your stack template
3796
+ # contains certain capabilities in order for AWS CloudFormation to
3797
+ # update the stack set and its associated stack instances.
3714
3798
  #
3715
- # The only valid values are CAPABILITY\_IAM and CAPABILITY\_NAMED\_IAM.
3716
- # The following resources require you to specify this parameter:
3799
+ # * `CAPABILITY_IAM` and `CAPABILITY_NAMED_IAM`
3717
3800
  #
3718
- # * AWS::IAM::AccessKey
3801
+ # Some stack templates might include resources that can affect
3802
+ # permissions in your AWS account; for example, by creating new AWS
3803
+ # Identity and Access Management (IAM) users. For those stacks sets,
3804
+ # you must explicitly acknowledge this by specifying one of these
3805
+ # capabilities.
3719
3806
  #
3720
- # * AWS::IAM::Group
3807
+ # The following IAM resources require you to specify either the
3808
+ # `CAPABILITY_IAM` or `CAPABILITY_NAMED_IAM` capability.
3721
3809
  #
3722
- # * AWS::IAM::InstanceProfile
3810
+ # * If you have IAM resources, you can specify either capability.
3723
3811
  #
3724
- # * AWS::IAM::Policy
3812
+ # * If you have IAM resources with custom names, you *must* specify
3813
+ # `CAPABILITY_NAMED_IAM`.
3725
3814
  #
3726
- # * AWS::IAM::Role
3815
+ # * If you don't specify either of these capabilities, AWS
3816
+ # CloudFormation returns an `InsufficientCapabilities` error.
3817
+ #
3818
+ # If your stack template contains these resources, we recommend that
3819
+ # you review all permissions associated with them and edit their
3820
+ # permissions if necessary.
3727
3821
  #
3728
- # * AWS::IAM::User
3822
+ # * [ AWS::IAM::AccessKey][1]
3729
3823
  #
3730
- # * AWS::IAM::UserToGroupAddition
3824
+ # * [ AWS::IAM::Group][2]
3731
3825
  #
3732
- # If your stack template contains these resources, we recommend that you
3733
- # review all permissions that are associated with them and edit their
3734
- # permissions if necessary.
3826
+ # * [ AWS::IAM::InstanceProfile][3]
3735
3827
  #
3736
- # If you have IAM resources, you can specify either capability. If you
3737
- # have IAM resources with custom names, you must specify
3738
- # CAPABILITY\_NAMED\_IAM. If you don't specify this parameter, this
3739
- # action returns an `InsufficientCapabilities` error.
3828
+ # * [ AWS::IAM::Policy][4]
3740
3829
  #
3741
- # For more information, see [Acknowledging IAM Resources in AWS
3742
- # CloudFormation Templates.][1]
3830
+ # * [ AWS::IAM::Role][5]
3743
3831
  #
3832
+ # * [ AWS::IAM::User][6]
3744
3833
  #
3834
+ # * [ AWS::IAM::UserToGroupAddition][7]
3745
3835
  #
3746
- # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
3836
+ # For more information, see [Acknowledging IAM Resources in AWS
3837
+ # CloudFormation Templates][8].
3838
+ #
3839
+ # * `CAPABILITY_AUTO_EXPAND`
3840
+ #
3841
+ # Some templates contain macros. If your stack template contains one
3842
+ # or more macros, and you choose to update a stack directly from the
3843
+ # processed template, without first reviewing the resulting changes in
3844
+ # a change set, you must acknowledge this capability. For more
3845
+ # information, see [Using AWS CloudFormation Macros to Perform Custom
3846
+ # Processing on Templates][9].
3847
+ #
3848
+ # Stack sets do not currently support macros in stack templates. (This
3849
+ # includes the [AWS::Include][10] and [AWS::Serverless][11]
3850
+ # transforms, which are macros hosted by AWS CloudFormation.) Even if
3851
+ # you specify this capability, if you include a macro in your template
3852
+ # the stack set operation will fail.
3853
+ #
3854
+ #
3855
+ #
3856
+ # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-accesskey.html
3857
+ # [2]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-group.html
3858
+ # [3]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-instanceprofile.html
3859
+ # [4]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-policy.html
3860
+ # [5]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html
3861
+ # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
3862
+ # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
3863
+ # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
3864
+ # [9]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
3865
+ # [10]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
3866
+ # [11]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
3747
3867
  #
3748
3868
  # @option params [Array<Types::Tag>] :tags
3749
3869
  # The key-value pairs to associate with this stack set and the stacks
@@ -4048,7 +4168,7 @@ module Aws::CloudFormation
4048
4168
  params: params,
4049
4169
  config: config)
4050
4170
  context[:gem_name] = 'aws-sdk-cloudformation'
4051
- context[:gem_version] = '1.13.0'
4171
+ context[:gem_version] = '1.14.0'
4052
4172
  Seahorse::Client::Request.new(handlers, context)
4053
4173
  end
4054
4174
 
@@ -205,10 +205,10 @@ module Aws::CloudFormation
205
205
  # [5]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html
206
206
  # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
207
207
  # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
208
- # [8]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
209
- # [9]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
210
- # [10]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
211
- # [11]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
208
+ # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
209
+ # [9]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
210
+ # [10]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
211
+ # [11]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
212
212
  # @option options [Array<String>] :resource_types
213
213
  # The template resource types that you have permissions to work with for
214
214
  # this create stack action, such as `AWS::EC2::Instance`, `AWS::EC2::*`,
@@ -197,7 +197,7 @@ module Aws::CloudFormation
197
197
  #
198
198
  #
199
199
  #
200
- # [1]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
200
+ # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
201
201
  # @return [Types::StackDriftInformation]
202
202
  def drift_information
203
203
  data[:drift_information]
@@ -559,10 +559,10 @@ module Aws::CloudFormation
559
559
  # [5]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html
560
560
  # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
561
561
  # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
562
- # [8]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
563
- # [9]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
564
- # [10]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
565
- # [11]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
562
+ # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
563
+ # [9]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
564
+ # [10]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
565
+ # [11]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
566
566
  # @option options [Array<String>] :resource_types
567
567
  # The template resource types that you have permissions to work with for
568
568
  # this create stack action, such as `AWS::EC2::Instance`, `AWS::EC2::*`,
@@ -899,10 +899,10 @@ module Aws::CloudFormation
899
899
  # [5]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html
900
900
  # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
901
901
  # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
902
- # [8]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
903
- # [9]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
904
- # [10]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
905
- # [11]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
902
+ # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
903
+ # [9]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
904
+ # [10]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
905
+ # [11]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
906
906
  # @option options [Array<String>] :resource_types
907
907
  # The template resource types that you have permissions to work with for
908
908
  # this update stack action, such as `AWS::EC2::Instance`, `AWS::EC2::*`,
@@ -107,7 +107,7 @@ module Aws::CloudFormation
107
107
  #
108
108
  #
109
109
  #
110
- # [1]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
110
+ # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
111
111
  # @return [Types::StackResourceDriftInformation]
112
112
  def drift_information
113
113
  data[:drift_information]
@@ -83,7 +83,7 @@ module Aws::CloudFormation
83
83
  #
84
84
  #
85
85
  #
86
- # [1]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
86
+ # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
87
87
  # @return [Types::StackResourceDriftInformationSummary]
88
88
  def drift_information
89
89
  data[:drift_information]
@@ -393,30 +393,78 @@ module Aws::CloudFormation
393
393
  # @return [Array<Types::Parameter>]
394
394
  #
395
395
  # @!attribute [rw] capabilities
396
- # A list of values that you must specify before AWS CloudFormation can
397
- # update certain stacks. Some stack templates might include resources
398
- # that can affect permissions in your AWS account, for example, by
399
- # creating new AWS Identity and Access Management (IAM) users. For
400
- # those stacks, you must explicitly acknowledge their capabilities by
401
- # specifying this parameter.
402
- #
403
- # The only valid values are `CAPABILITY_IAM` and
404
- # `CAPABILITY_NAMED_IAM`. The following resources require you to
405
- # specify this parameter: [ AWS::IAM::AccessKey][1], [
406
- # AWS::IAM::Group][2], [ AWS::IAM::InstanceProfile][3], [
407
- # AWS::IAM::Policy][4], [ AWS::IAM::Role][5], [ AWS::IAM::User][6],
408
- # and [ AWS::IAM::UserToGroupAddition][7]. If your stack template
409
- # contains these resources, we recommend that you review all
410
- # permissions associated with them and edit their permissions if
411
- # necessary.
412
- #
413
- # If you have IAM resources, you can specify either capability. If you
414
- # have IAM resources with custom names, you must specify
415
- # `CAPABILITY_NAMED_IAM`. If you don't specify this parameter, this
416
- # action returns an `InsufficientCapabilities` error.
396
+ # In some cases, you must explicity acknowledge that your stack
397
+ # template contains certain capabilities in order for AWS
398
+ # CloudFormation to create the stack.
417
399
  #
418
- # For more information, see [Acknowledging IAM Resources in AWS
419
- # CloudFormation Templates][8].
400
+ # * `CAPABILITY_IAM` and `CAPABILITY_NAMED_IAM`
401
+ #
402
+ # Some stack templates might include resources that can affect
403
+ # permissions in your AWS account; for example, by creating new AWS
404
+ # Identity and Access Management (IAM) users. For those stacks, you
405
+ # must explicitly acknowledge this by specifying one of these
406
+ # capabilities.
407
+ #
408
+ # The following IAM resources require you to specify either the
409
+ # `CAPABILITY_IAM` or `CAPABILITY_NAMED_IAM` capability.
410
+ #
411
+ # * If you have IAM resources, you can specify either capability.
412
+ #
413
+ # * If you have IAM resources with custom names, you *must* specify
414
+ # `CAPABILITY_NAMED_IAM`.
415
+ #
416
+ # * If you don't specify either of these capabilities, AWS
417
+ # CloudFormation returns an `InsufficientCapabilities` error.
418
+ #
419
+ # If your stack template contains these resources, we recommend that
420
+ # you review all permissions associated with them and edit their
421
+ # permissions if necessary.
422
+ #
423
+ # * [ AWS::IAM::AccessKey][1]
424
+ #
425
+ # * [ AWS::IAM::Group][2]
426
+ #
427
+ # * [ AWS::IAM::InstanceProfile][3]
428
+ #
429
+ # * [ AWS::IAM::Policy][4]
430
+ #
431
+ # * [ AWS::IAM::Role][5]
432
+ #
433
+ # * [ AWS::IAM::User][6]
434
+ #
435
+ # * [ AWS::IAM::UserToGroupAddition][7]
436
+ #
437
+ # For more information, see [Acknowledging IAM Resources in AWS
438
+ # CloudFormation Templates][8].
439
+ #
440
+ # * `CAPABILITY_AUTO_EXPAND`
441
+ #
442
+ # Some template contain macros. Macros perform custom processing on
443
+ # templates; this can include simple actions like find-and-replace
444
+ # operations, all the way to extensive transformations of entire
445
+ # templates. Because of this, users typically create a change set
446
+ # from the processed template, so that they can review the changes
447
+ # resulting from the macros before actually creating the stack. If
448
+ # your stack template contains one or more macros, and you choose to
449
+ # create a stack directly from the processed template, without first
450
+ # reviewing the resulting changes in a change set, you must
451
+ # acknowledge this capability. This includes the [AWS::Include][9]
452
+ # and [AWS::Serverless][10] transforms, which are macros hosted by
453
+ # AWS CloudFormation.
454
+ #
455
+ # <note markdown="1"> This capacity does not apply to creating change sets, and
456
+ # specifying it when creating change sets has no effect.
457
+ #
458
+ # Also, change sets do not currently support nested stacks. If you
459
+ # want to create a stack from a stack template that contains macros
460
+ # *and* nested stacks, you must create or update the stack directly
461
+ # from the template using the CreateStack or UpdateStack action, and
462
+ # specifying this capability.
463
+ #
464
+ # </note>
465
+ #
466
+ # For more information on macros, see [Using AWS CloudFormation
467
+ # Macros to Perform Custom Processing on Templates][11].
420
468
  #
421
469
  #
422
470
  #
@@ -428,6 +476,9 @@ module Aws::CloudFormation
428
476
  # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
429
477
  # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
430
478
  # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
479
+ # [9]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
480
+ # [10]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
481
+ # [11]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
431
482
  # @return [Array<String>]
432
483
  #
433
484
  # @!attribute [rw] resource_types
@@ -765,10 +816,10 @@ module Aws::CloudFormation
765
816
  # [5]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html
766
817
  # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
767
818
  # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
768
- # [8]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
769
- # [9]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
770
- # [10]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
771
- # [11]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
819
+ # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
820
+ # [9]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
821
+ # [10]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
822
+ # [11]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
772
823
  # @return [Array<String>]
773
824
  #
774
825
  # @!attribute [rw] resource_types
@@ -1122,46 +1173,80 @@ module Aws::CloudFormation
1122
1173
  # @return [Array<Types::Parameter>]
1123
1174
  #
1124
1175
  # @!attribute [rw] capabilities
1125
- # A list of values that you must specify before AWS CloudFormation can
1126
- # create certain stack sets. Some stack set templates might include
1127
- # resources that can affect permissions in your AWS account—for
1128
- # example, by creating new AWS Identity and Access Management (IAM)
1129
- # users. For those stack sets, you must explicitly acknowledge their
1130
- # capabilities by specifying this parameter.
1176
+ # In some cases, you must explicity acknowledge that your stack set
1177
+ # template contains certain capabilities in order for AWS
1178
+ # CloudFormation to create the stack set and related stack instances.
1131
1179
  #
1132
- # The only valid values are CAPABILITY\_IAM and
1133
- # CAPABILITY\_NAMED\_IAM. The following resources require you to
1134
- # specify this parameter:
1180
+ # * `CAPABILITY_IAM` and `CAPABILITY_NAMED_IAM`
1135
1181
  #
1136
- # * AWS::IAM::AccessKey
1182
+ # Some stack templates might include resources that can affect
1183
+ # permissions in your AWS account; for example, by creating new AWS
1184
+ # Identity and Access Management (IAM) users. For those stack sets,
1185
+ # you must explicitly acknowledge this by specifying one of these
1186
+ # capabilities.
1137
1187
  #
1138
- # * AWS::IAM::Group
1188
+ # The following IAM resources require you to specify either the
1189
+ # `CAPABILITY_IAM` or `CAPABILITY_NAMED_IAM` capability.
1139
1190
  #
1140
- # * AWS::IAM::InstanceProfile
1191
+ # * If you have IAM resources, you can specify either capability.
1141
1192
  #
1142
- # * AWS::IAM::Policy
1193
+ # * If you have IAM resources with custom names, you *must* specify
1194
+ # `CAPABILITY_NAMED_IAM`.
1143
1195
  #
1144
- # * AWS::IAM::Role
1196
+ # * If you don't specify either of these capabilities, AWS
1197
+ # CloudFormation returns an `InsufficientCapabilities` error.
1145
1198
  #
1146
- # * AWS::IAM::User
1199
+ # If your stack template contains these resources, we recommend that
1200
+ # you review all permissions associated with them and edit their
1201
+ # permissions if necessary.
1147
1202
  #
1148
- # * AWS::IAM::UserToGroupAddition
1203
+ # * [ AWS::IAM::AccessKey][1]
1149
1204
  #
1150
- # If your stack template contains these resources, we recommend that
1151
- # you review all permissions that are associated with them and edit
1152
- # their permissions if necessary.
1205
+ # * [ AWS::IAM::Group][2]
1153
1206
  #
1154
- # If you have IAM resources, you can specify either capability. If you
1155
- # have IAM resources with custom names, you must specify
1156
- # CAPABILITY\_NAMED\_IAM. If you don't specify this parameter, this
1157
- # action returns an `InsufficientCapabilities` error.
1207
+ # * [ AWS::IAM::InstanceProfile][3]
1158
1208
  #
1159
- # For more information, see [Acknowledging IAM Resources in AWS
1160
- # CloudFormation Templates.][1]
1209
+ # * [ AWS::IAM::Policy][4]
1161
1210
  #
1211
+ # * [ AWS::IAM::Role][5]
1162
1212
  #
1213
+ # * [ AWS::IAM::User][6]
1163
1214
  #
1164
- # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
1215
+ # * [ AWS::IAM::UserToGroupAddition][7]
1216
+ #
1217
+ # For more information, see [Acknowledging IAM Resources in AWS
1218
+ # CloudFormation Templates][8].
1219
+ #
1220
+ # * `CAPABILITY_AUTO_EXPAND`
1221
+ #
1222
+ # Some templates contain macros. If your stack template contains one
1223
+ # or more macros, and you choose to create a stack directly from the
1224
+ # processed template, without first reviewing the resulting changes
1225
+ # in a change set, you must acknowledge this capability. For more
1226
+ # information, see [Using AWS CloudFormation Macros to Perform
1227
+ # Custom Processing on Templates][9].
1228
+ #
1229
+ # <note markdown="1"> Stack sets do not currently support macros in stack templates.
1230
+ # (This includes the [AWS::Include][10] and [AWS::Serverless][11]
1231
+ # transforms, which are macros hosted by AWS CloudFormation.) Even
1232
+ # if you specify this capability, if you include a macro in your
1233
+ # template the stack set operation will fail.
1234
+ #
1235
+ # </note>
1236
+ #
1237
+ #
1238
+ #
1239
+ # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-accesskey.html
1240
+ # [2]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-group.html
1241
+ # [3]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-instanceprofile.html
1242
+ # [4]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-policy.html
1243
+ # [5]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html
1244
+ # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
1245
+ # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
1246
+ # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
1247
+ # [9]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
1248
+ # [10]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
1249
+ # [11]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
1165
1250
  # @return [Array<String>]
1166
1251
  #
1167
1252
  # @!attribute [rw] tags
@@ -3880,7 +3965,7 @@ module Aws::CloudFormation
3880
3965
  #
3881
3966
  #
3882
3967
  #
3883
- # [1]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
3968
+ # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
3884
3969
  # @return [Types::StackDriftInformation]
3885
3970
  #
3886
3971
  # @see http://docs.aws.amazon.com/goto/WebAPI/cloudformation-2010-05-15/Stack AWS API Documentation
@@ -4259,7 +4344,7 @@ module Aws::CloudFormation
4259
4344
  #
4260
4345
  #
4261
4346
  #
4262
- # [1]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
4347
+ # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
4263
4348
  # @return [Types::StackResourceDriftInformation]
4264
4349
  #
4265
4350
  # @see http://docs.aws.amazon.com/goto/WebAPI/cloudformation-2010-05-15/StackResource AWS API Documentation
@@ -4341,7 +4426,7 @@ module Aws::CloudFormation
4341
4426
  #
4342
4427
  #
4343
4428
  #
4344
- # [1]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
4429
+ # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
4345
4430
  # @return [Types::StackResourceDriftInformation]
4346
4431
  #
4347
4432
  # @see http://docs.aws.amazon.com/goto/WebAPI/cloudformation-2010-05-15/StackResourceDetail AWS API Documentation
@@ -4379,7 +4464,7 @@ module Aws::CloudFormation
4379
4464
  #
4380
4465
  #
4381
4466
  # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
4382
- # [2]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift-resource-list.html
4467
+ # [2]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift-resource-list.html
4383
4468
  #
4384
4469
  # @!attribute [rw] stack_id
4385
4470
  # The ID of the stack.
@@ -4597,7 +4682,7 @@ module Aws::CloudFormation
4597
4682
  #
4598
4683
  #
4599
4684
  #
4600
- # [1]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
4685
+ # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
4601
4686
  # @return [Types::StackResourceDriftInformationSummary]
4602
4687
  #
4603
4688
  # @see http://docs.aws.amazon.com/goto/WebAPI/cloudformation-2010-05-15/StackResourceSummary AWS API Documentation
@@ -5134,7 +5219,7 @@ module Aws::CloudFormation
5134
5219
  #
5135
5220
  #
5136
5221
  #
5137
- # [1]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
5222
+ # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
5138
5223
  # @return [Types::StackDriftInformationSummary]
5139
5224
  #
5140
5225
  # @see http://docs.aws.amazon.com/goto/WebAPI/cloudformation-2010-05-15/StackSummary AWS API Documentation
@@ -5446,10 +5531,10 @@ module Aws::CloudFormation
5446
5531
  # [5]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html
5447
5532
  # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
5448
5533
  # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
5449
- # [8]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
5450
- # [9]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
5451
- # [10]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
5452
- # [11]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
5534
+ # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
5535
+ # [9]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
5536
+ # [10]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
5537
+ # [11]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
5453
5538
  # @return [Array<String>]
5454
5539
  #
5455
5540
  # @!attribute [rw] resource_types
@@ -5812,46 +5897,79 @@ module Aws::CloudFormation
5812
5897
  # @return [Array<Types::Parameter>]
5813
5898
  #
5814
5899
  # @!attribute [rw] capabilities
5815
- # A list of values that you must specify before AWS CloudFormation can
5816
- # create certain stack sets. Some stack set templates might include
5817
- # resources that can affect permissions in your AWS account—for
5818
- # example, by creating new AWS Identity and Access Management (IAM)
5819
- # users. For those stack sets, you must explicitly acknowledge their
5820
- # capabilities by specifying this parameter.
5900
+ # In some cases, you must explicity acknowledge that your stack
5901
+ # template contains certain capabilities in order for AWS
5902
+ # CloudFormation to update the stack set and its associated stack
5903
+ # instances.
5821
5904
  #
5822
- # The only valid values are CAPABILITY\_IAM and
5823
- # CAPABILITY\_NAMED\_IAM. The following resources require you to
5824
- # specify this parameter:
5905
+ # * `CAPABILITY_IAM` and `CAPABILITY_NAMED_IAM`
5825
5906
  #
5826
- # * AWS::IAM::AccessKey
5907
+ # Some stack templates might include resources that can affect
5908
+ # permissions in your AWS account; for example, by creating new AWS
5909
+ # Identity and Access Management (IAM) users. For those stacks sets,
5910
+ # you must explicitly acknowledge this by specifying one of these
5911
+ # capabilities.
5827
5912
  #
5828
- # * AWS::IAM::Group
5913
+ # The following IAM resources require you to specify either the
5914
+ # `CAPABILITY_IAM` or `CAPABILITY_NAMED_IAM` capability.
5829
5915
  #
5830
- # * AWS::IAM::InstanceProfile
5916
+ # * If you have IAM resources, you can specify either capability.
5831
5917
  #
5832
- # * AWS::IAM::Policy
5918
+ # * If you have IAM resources with custom names, you *must* specify
5919
+ # `CAPABILITY_NAMED_IAM`.
5833
5920
  #
5834
- # * AWS::IAM::Role
5921
+ # * If you don't specify either of these capabilities, AWS
5922
+ # CloudFormation returns an `InsufficientCapabilities` error.
5835
5923
  #
5836
- # * AWS::IAM::User
5924
+ # If your stack template contains these resources, we recommend that
5925
+ # you review all permissions associated with them and edit their
5926
+ # permissions if necessary.
5837
5927
  #
5838
- # * AWS::IAM::UserToGroupAddition
5928
+ # * [ AWS::IAM::AccessKey][1]
5839
5929
  #
5840
- # If your stack template contains these resources, we recommend that
5841
- # you review all permissions that are associated with them and edit
5842
- # their permissions if necessary.
5930
+ # * [ AWS::IAM::Group][2]
5843
5931
  #
5844
- # If you have IAM resources, you can specify either capability. If you
5845
- # have IAM resources with custom names, you must specify
5846
- # CAPABILITY\_NAMED\_IAM. If you don't specify this parameter, this
5847
- # action returns an `InsufficientCapabilities` error.
5932
+ # * [ AWS::IAM::InstanceProfile][3]
5848
5933
  #
5849
- # For more information, see [Acknowledging IAM Resources in AWS
5850
- # CloudFormation Templates.][1]
5934
+ # * [ AWS::IAM::Policy][4]
5851
5935
  #
5936
+ # * [ AWS::IAM::Role][5]
5852
5937
  #
5938
+ # * [ AWS::IAM::User][6]
5853
5939
  #
5854
- # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
5940
+ # * [ AWS::IAM::UserToGroupAddition][7]
5941
+ #
5942
+ # For more information, see [Acknowledging IAM Resources in AWS
5943
+ # CloudFormation Templates][8].
5944
+ #
5945
+ # * `CAPABILITY_AUTO_EXPAND`
5946
+ #
5947
+ # Some templates contain macros. If your stack template contains one
5948
+ # or more macros, and you choose to update a stack directly from the
5949
+ # processed template, without first reviewing the resulting changes
5950
+ # in a change set, you must acknowledge this capability. For more
5951
+ # information, see [Using AWS CloudFormation Macros to Perform
5952
+ # Custom Processing on Templates][9].
5953
+ #
5954
+ # Stack sets do not currently support macros in stack templates.
5955
+ # (This includes the [AWS::Include][10] and [AWS::Serverless][11]
5956
+ # transforms, which are macros hosted by AWS CloudFormation.) Even
5957
+ # if you specify this capability, if you include a macro in your
5958
+ # template the stack set operation will fail.
5959
+ #
5960
+ #
5961
+ #
5962
+ # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-accesskey.html
5963
+ # [2]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-group.html
5964
+ # [3]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-instanceprofile.html
5965
+ # [4]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-policy.html
5966
+ # [5]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html
5967
+ # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
5968
+ # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
5969
+ # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
5970
+ # [9]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
5971
+ # [10]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
5972
+ # [11]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
5855
5973
  # @return [Array<String>]
5856
5974
  #
5857
5975
  # @!attribute [rw] tags
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-cloudformation
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.13.0
4
+ version: 1.14.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2018-11-20 00:00:00.000000000 Z
11
+ date: 2018-12-14 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core