aws-sdk-cloudformation 1.13.0 → 1.14.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: efc9f6e59034c0f6327403c04e3b158872a1ec88
4
- data.tar.gz: 0dae87a73009f6151eed04b55b4587ab7a4b463a
3
+ metadata.gz: d73d3c8c5d3c76eed67107c6f5ccfc73865bd9e4
4
+ data.tar.gz: 3a91931755163abe31bebca476184df3b1b2751c
5
5
  SHA512:
6
- metadata.gz: b113943565f6c65a7de970621330ca26a0df9ace3aebd7f45342580d09ad07811d59bac76f09b32cb56f95c6b94fbb0978caacd659204cc462ca403c96b9e9fc
7
- data.tar.gz: a43d9b6876b3fdd1f4edec5b4acbb3d068a1f2c35c96c846a4dfe05c09a9782879eb33225123a1c82761c3ee9dca75e7162bd1df3909ad2bf8ad1dd4521abbfe
6
+ metadata.gz: 75a76b10f9e197f37f2659d2f9b7bd452126b58ca6d5f58d4c7a9382ce82e12bc5ea9c65d0ae3e7a2d3c073ea8bb38bbb5f956a98e4a4c07637e034a0c73c8ba
7
+ data.tar.gz: 92e9c340e6ccb19ced905a139e4e6b768301fe6466901d751d9970f3ed297974146a79ca154437feac84e2a8b1bfb0f9a354846dc148e4ed8174a23a21dce548
@@ -47,6 +47,6 @@ require_relative 'aws-sdk-cloudformation/customizations'
47
47
  # @service
48
48
  module Aws::CloudFormation
49
49
 
50
- GEM_VERSION = '1.13.0'
50
+ GEM_VERSION = '1.14.0'
51
51
 
52
52
  end
@@ -412,29 +412,78 @@ module Aws::CloudFormation
412
412
  # change set. For more information, see the Parameter data type.
413
413
  #
414
414
  # @option params [Array<String>] :capabilities
415
- # A list of values that you must specify before AWS CloudFormation can
416
- # update certain stacks. Some stack templates might include resources
417
- # that can affect permissions in your AWS account, for example, by
418
- # creating new AWS Identity and Access Management (IAM) users. For those
419
- # stacks, you must explicitly acknowledge their capabilities by
420
- # specifying this parameter.
415
+ # In some cases, you must explicity acknowledge that your stack template
416
+ # contains certain capabilities in order for AWS CloudFormation to
417
+ # create the stack.
418
+ #
419
+ # * `CAPABILITY_IAM` and `CAPABILITY_NAMED_IAM`
420
+ #
421
+ # Some stack templates might include resources that can affect
422
+ # permissions in your AWS account; for example, by creating new AWS
423
+ # Identity and Access Management (IAM) users. For those stacks, you
424
+ # must explicitly acknowledge this by specifying one of these
425
+ # capabilities.
426
+ #
427
+ # The following IAM resources require you to specify either the
428
+ # `CAPABILITY_IAM` or `CAPABILITY_NAMED_IAM` capability.
429
+ #
430
+ # * If you have IAM resources, you can specify either capability.
431
+ #
432
+ # * If you have IAM resources with custom names, you *must* specify
433
+ # `CAPABILITY_NAMED_IAM`.
434
+ #
435
+ # * If you don't specify either of these capabilities, AWS
436
+ # CloudFormation returns an `InsufficientCapabilities` error.
437
+ #
438
+ # If your stack template contains these resources, we recommend that
439
+ # you review all permissions associated with them and edit their
440
+ # permissions if necessary.
441
+ #
442
+ # * [ AWS::IAM::AccessKey][1]
421
443
  #
422
- # The only valid values are `CAPABILITY_IAM` and `CAPABILITY_NAMED_IAM`.
423
- # The following resources require you to specify this parameter: [
424
- # AWS::IAM::AccessKey][1], [ AWS::IAM::Group][2], [
425
- # AWS::IAM::InstanceProfile][3], [ AWS::IAM::Policy][4], [
426
- # AWS::IAM::Role][5], [ AWS::IAM::User][6], and [
427
- # AWS::IAM::UserToGroupAddition][7]. If your stack template contains
428
- # these resources, we recommend that you review all permissions
429
- # associated with them and edit their permissions if necessary.
444
+ # * [ AWS::IAM::Group][2]
430
445
  #
431
- # If you have IAM resources, you can specify either capability. If you
432
- # have IAM resources with custom names, you must specify
433
- # `CAPABILITY_NAMED_IAM`. If you don't specify this parameter, this
434
- # action returns an `InsufficientCapabilities` error.
446
+ # * [ AWS::IAM::InstanceProfile][3]
435
447
  #
436
- # For more information, see [Acknowledging IAM Resources in AWS
437
- # CloudFormation Templates][8].
448
+ # * [ AWS::IAM::Policy][4]
449
+ #
450
+ # * [ AWS::IAM::Role][5]
451
+ #
452
+ # * [ AWS::IAM::User][6]
453
+ #
454
+ # * [ AWS::IAM::UserToGroupAddition][7]
455
+ #
456
+ # For more information, see [Acknowledging IAM Resources in AWS
457
+ # CloudFormation Templates][8].
458
+ #
459
+ # * `CAPABILITY_AUTO_EXPAND`
460
+ #
461
+ # Some template contain macros. Macros perform custom processing on
462
+ # templates; this can include simple actions like find-and-replace
463
+ # operations, all the way to extensive transformations of entire
464
+ # templates. Because of this, users typically create a change set from
465
+ # the processed template, so that they can review the changes
466
+ # resulting from the macros before actually creating the stack. If
467
+ # your stack template contains one or more macros, and you choose to
468
+ # create a stack directly from the processed template, without first
469
+ # reviewing the resulting changes in a change set, you must
470
+ # acknowledge this capability. This includes the [AWS::Include][9] and
471
+ # [AWS::Serverless][10] transforms, which are macros hosted by AWS
472
+ # CloudFormation.
473
+ #
474
+ # <note markdown="1"> This capacity does not apply to creating change sets, and specifying
475
+ # it when creating change sets has no effect.
476
+ #
477
+ # Also, change sets do not currently support nested stacks. If you
478
+ # want to create a stack from a stack template that contains macros
479
+ # *and* nested stacks, you must create or update the stack directly
480
+ # from the template using the CreateStack or UpdateStack action, and
481
+ # specifying this capability.
482
+ #
483
+ # </note>
484
+ #
485
+ # For more information on macros, see [Using AWS CloudFormation Macros
486
+ # to Perform Custom Processing on Templates][11].
438
487
  #
439
488
  #
440
489
  #
@@ -446,6 +495,9 @@ module Aws::CloudFormation
446
495
  # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
447
496
  # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
448
497
  # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
498
+ # [9]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
499
+ # [10]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
500
+ # [11]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
449
501
  #
450
502
  # @option params [Array<String>] :resource_types
451
503
  # The template resource types that you have permissions to work with if
@@ -743,10 +795,10 @@ module Aws::CloudFormation
743
795
  # [5]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html
744
796
  # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
745
797
  # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
746
- # [8]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
747
- # [9]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
748
- # [10]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
749
- # [11]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
798
+ # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
799
+ # [9]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
800
+ # [10]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
801
+ # [11]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
750
802
  #
751
803
  # @option params [Array<String>] :resource_types
752
804
  # The template resource types that you have permissions to work with for
@@ -1072,45 +1124,80 @@ module Aws::CloudFormation
1072
1124
  # The input parameters for the stack set template.
1073
1125
  #
1074
1126
  # @option params [Array<String>] :capabilities
1075
- # A list of values that you must specify before AWS CloudFormation can
1076
- # create certain stack sets. Some stack set templates might include
1077
- # resources that can affect permissions in your AWS account—for example,
1078
- # by creating new AWS Identity and Access Management (IAM) users. For
1079
- # those stack sets, you must explicitly acknowledge their capabilities
1080
- # by specifying this parameter.
1127
+ # In some cases, you must explicity acknowledge that your stack set
1128
+ # template contains certain capabilities in order for AWS CloudFormation
1129
+ # to create the stack set and related stack instances.
1130
+ #
1131
+ # * `CAPABILITY_IAM` and `CAPABILITY_NAMED_IAM`
1132
+ #
1133
+ # Some stack templates might include resources that can affect
1134
+ # permissions in your AWS account; for example, by creating new AWS
1135
+ # Identity and Access Management (IAM) users. For those stack sets,
1136
+ # you must explicitly acknowledge this by specifying one of these
1137
+ # capabilities.
1138
+ #
1139
+ # The following IAM resources require you to specify either the
1140
+ # `CAPABILITY_IAM` or `CAPABILITY_NAMED_IAM` capability.
1141
+ #
1142
+ # * If you have IAM resources, you can specify either capability.
1081
1143
  #
1082
- # The only valid values are CAPABILITY\_IAM and CAPABILITY\_NAMED\_IAM.
1083
- # The following resources require you to specify this parameter:
1144
+ # * If you have IAM resources with custom names, you *must* specify
1145
+ # `CAPABILITY_NAMED_IAM`.
1146
+ #
1147
+ # * If you don't specify either of these capabilities, AWS
1148
+ # CloudFormation returns an `InsufficientCapabilities` error.
1149
+ #
1150
+ # If your stack template contains these resources, we recommend that
1151
+ # you review all permissions associated with them and edit their
1152
+ # permissions if necessary.
1084
1153
  #
1085
- # * AWS::IAM::AccessKey
1154
+ # * [ AWS::IAM::AccessKey][1]
1086
1155
  #
1087
- # * AWS::IAM::Group
1156
+ # * [ AWS::IAM::Group][2]
1088
1157
  #
1089
- # * AWS::IAM::InstanceProfile
1158
+ # * [ AWS::IAM::InstanceProfile][3]
1090
1159
  #
1091
- # * AWS::IAM::Policy
1160
+ # * [ AWS::IAM::Policy][4]
1092
1161
  #
1093
- # * AWS::IAM::Role
1162
+ # * [ AWS::IAM::Role][5]
1163
+ #
1164
+ # * [ AWS::IAM::User][6]
1165
+ #
1166
+ # * [ AWS::IAM::UserToGroupAddition][7]
1094
1167
  #
1095
- # * AWS::IAM::User
1168
+ # For more information, see [Acknowledging IAM Resources in AWS
1169
+ # CloudFormation Templates][8].
1096
1170
  #
1097
- # * AWS::IAM::UserToGroupAddition
1171
+ # * `CAPABILITY_AUTO_EXPAND`
1098
1172
  #
1099
- # If your stack template contains these resources, we recommend that you
1100
- # review all permissions that are associated with them and edit their
1101
- # permissions if necessary.
1173
+ # Some templates contain macros. If your stack template contains one
1174
+ # or more macros, and you choose to create a stack directly from the
1175
+ # processed template, without first reviewing the resulting changes in
1176
+ # a change set, you must acknowledge this capability. For more
1177
+ # information, see [Using AWS CloudFormation Macros to Perform Custom
1178
+ # Processing on Templates][9].
1102
1179
  #
1103
- # If you have IAM resources, you can specify either capability. If you
1104
- # have IAM resources with custom names, you must specify
1105
- # CAPABILITY\_NAMED\_IAM. If you don't specify this parameter, this
1106
- # action returns an `InsufficientCapabilities` error.
1180
+ # <note markdown="1"> Stack sets do not currently support macros in stack templates. (This
1181
+ # includes the [AWS::Include][10] and [AWS::Serverless][11]
1182
+ # transforms, which are macros hosted by AWS CloudFormation.) Even if
1183
+ # you specify this capability, if you include a macro in your template
1184
+ # the stack set operation will fail.
1107
1185
  #
1108
- # For more information, see [Acknowledging IAM Resources in AWS
1109
- # CloudFormation Templates.][1]
1186
+ # </note>
1110
1187
  #
1111
1188
  #
1112
1189
  #
1113
- # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
1190
+ # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-accesskey.html
1191
+ # [2]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-group.html
1192
+ # [3]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-instanceprofile.html
1193
+ # [4]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-policy.html
1194
+ # [5]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html
1195
+ # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
1196
+ # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
1197
+ # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
1198
+ # [9]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
1199
+ # [10]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
1200
+ # [11]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
1114
1201
  #
1115
1202
  # @option params [Array<Types::Tag>] :tags
1116
1203
  # The key-value pairs to associate with this stack set and the stacks
@@ -3354,10 +3441,10 @@ module Aws::CloudFormation
3354
3441
  # [5]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html
3355
3442
  # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
3356
3443
  # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
3357
- # [8]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
3358
- # [9]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
3359
- # [10]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
3360
- # [11]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
3444
+ # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
3445
+ # [9]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
3446
+ # [10]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
3447
+ # [11]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
3361
3448
  #
3362
3449
  # @option params [Array<String>] :resource_types
3363
3450
  # The template resource types that you have permissions to work with for
@@ -3705,45 +3792,78 @@ module Aws::CloudFormation
3705
3792
  # A list of input parameters for the stack set template.
3706
3793
  #
3707
3794
  # @option params [Array<String>] :capabilities
3708
- # A list of values that you must specify before AWS CloudFormation can
3709
- # create certain stack sets. Some stack set templates might include
3710
- # resources that can affect permissions in your AWS account—for example,
3711
- # by creating new AWS Identity and Access Management (IAM) users. For
3712
- # those stack sets, you must explicitly acknowledge their capabilities
3713
- # by specifying this parameter.
3795
+ # In some cases, you must explicity acknowledge that your stack template
3796
+ # contains certain capabilities in order for AWS CloudFormation to
3797
+ # update the stack set and its associated stack instances.
3714
3798
  #
3715
- # The only valid values are CAPABILITY\_IAM and CAPABILITY\_NAMED\_IAM.
3716
- # The following resources require you to specify this parameter:
3799
+ # * `CAPABILITY_IAM` and `CAPABILITY_NAMED_IAM`
3717
3800
  #
3718
- # * AWS::IAM::AccessKey
3801
+ # Some stack templates might include resources that can affect
3802
+ # permissions in your AWS account; for example, by creating new AWS
3803
+ # Identity and Access Management (IAM) users. For those stacks sets,
3804
+ # you must explicitly acknowledge this by specifying one of these
3805
+ # capabilities.
3719
3806
  #
3720
- # * AWS::IAM::Group
3807
+ # The following IAM resources require you to specify either the
3808
+ # `CAPABILITY_IAM` or `CAPABILITY_NAMED_IAM` capability.
3721
3809
  #
3722
- # * AWS::IAM::InstanceProfile
3810
+ # * If you have IAM resources, you can specify either capability.
3723
3811
  #
3724
- # * AWS::IAM::Policy
3812
+ # * If you have IAM resources with custom names, you *must* specify
3813
+ # `CAPABILITY_NAMED_IAM`.
3725
3814
  #
3726
- # * AWS::IAM::Role
3815
+ # * If you don't specify either of these capabilities, AWS
3816
+ # CloudFormation returns an `InsufficientCapabilities` error.
3817
+ #
3818
+ # If your stack template contains these resources, we recommend that
3819
+ # you review all permissions associated with them and edit their
3820
+ # permissions if necessary.
3727
3821
  #
3728
- # * AWS::IAM::User
3822
+ # * [ AWS::IAM::AccessKey][1]
3729
3823
  #
3730
- # * AWS::IAM::UserToGroupAddition
3824
+ # * [ AWS::IAM::Group][2]
3731
3825
  #
3732
- # If your stack template contains these resources, we recommend that you
3733
- # review all permissions that are associated with them and edit their
3734
- # permissions if necessary.
3826
+ # * [ AWS::IAM::InstanceProfile][3]
3735
3827
  #
3736
- # If you have IAM resources, you can specify either capability. If you
3737
- # have IAM resources with custom names, you must specify
3738
- # CAPABILITY\_NAMED\_IAM. If you don't specify this parameter, this
3739
- # action returns an `InsufficientCapabilities` error.
3828
+ # * [ AWS::IAM::Policy][4]
3740
3829
  #
3741
- # For more information, see [Acknowledging IAM Resources in AWS
3742
- # CloudFormation Templates.][1]
3830
+ # * [ AWS::IAM::Role][5]
3743
3831
  #
3832
+ # * [ AWS::IAM::User][6]
3744
3833
  #
3834
+ # * [ AWS::IAM::UserToGroupAddition][7]
3745
3835
  #
3746
- # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
3836
+ # For more information, see [Acknowledging IAM Resources in AWS
3837
+ # CloudFormation Templates][8].
3838
+ #
3839
+ # * `CAPABILITY_AUTO_EXPAND`
3840
+ #
3841
+ # Some templates contain macros. If your stack template contains one
3842
+ # or more macros, and you choose to update a stack directly from the
3843
+ # processed template, without first reviewing the resulting changes in
3844
+ # a change set, you must acknowledge this capability. For more
3845
+ # information, see [Using AWS CloudFormation Macros to Perform Custom
3846
+ # Processing on Templates][9].
3847
+ #
3848
+ # Stack sets do not currently support macros in stack templates. (This
3849
+ # includes the [AWS::Include][10] and [AWS::Serverless][11]
3850
+ # transforms, which are macros hosted by AWS CloudFormation.) Even if
3851
+ # you specify this capability, if you include a macro in your template
3852
+ # the stack set operation will fail.
3853
+ #
3854
+ #
3855
+ #
3856
+ # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-accesskey.html
3857
+ # [2]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-group.html
3858
+ # [3]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-instanceprofile.html
3859
+ # [4]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-policy.html
3860
+ # [5]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html
3861
+ # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
3862
+ # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
3863
+ # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
3864
+ # [9]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
3865
+ # [10]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
3866
+ # [11]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
3747
3867
  #
3748
3868
  # @option params [Array<Types::Tag>] :tags
3749
3869
  # The key-value pairs to associate with this stack set and the stacks
@@ -4048,7 +4168,7 @@ module Aws::CloudFormation
4048
4168
  params: params,
4049
4169
  config: config)
4050
4170
  context[:gem_name] = 'aws-sdk-cloudformation'
4051
- context[:gem_version] = '1.13.0'
4171
+ context[:gem_version] = '1.14.0'
4052
4172
  Seahorse::Client::Request.new(handlers, context)
4053
4173
  end
4054
4174
 
@@ -205,10 +205,10 @@ module Aws::CloudFormation
205
205
  # [5]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html
206
206
  # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
207
207
  # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
208
- # [8]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
209
- # [9]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
210
- # [10]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
211
- # [11]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
208
+ # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
209
+ # [9]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
210
+ # [10]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
211
+ # [11]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
212
212
  # @option options [Array<String>] :resource_types
213
213
  # The template resource types that you have permissions to work with for
214
214
  # this create stack action, such as `AWS::EC2::Instance`, `AWS::EC2::*`,
@@ -197,7 +197,7 @@ module Aws::CloudFormation
197
197
  #
198
198
  #
199
199
  #
200
- # [1]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
200
+ # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
201
201
  # @return [Types::StackDriftInformation]
202
202
  def drift_information
203
203
  data[:drift_information]
@@ -559,10 +559,10 @@ module Aws::CloudFormation
559
559
  # [5]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html
560
560
  # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
561
561
  # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
562
- # [8]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
563
- # [9]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
564
- # [10]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
565
- # [11]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
562
+ # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
563
+ # [9]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
564
+ # [10]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
565
+ # [11]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
566
566
  # @option options [Array<String>] :resource_types
567
567
  # The template resource types that you have permissions to work with for
568
568
  # this create stack action, such as `AWS::EC2::Instance`, `AWS::EC2::*`,
@@ -899,10 +899,10 @@ module Aws::CloudFormation
899
899
  # [5]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html
900
900
  # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
901
901
  # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
902
- # [8]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
903
- # [9]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
904
- # [10]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
905
- # [11]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
902
+ # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
903
+ # [9]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
904
+ # [10]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
905
+ # [11]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
906
906
  # @option options [Array<String>] :resource_types
907
907
  # The template resource types that you have permissions to work with for
908
908
  # this update stack action, such as `AWS::EC2::Instance`, `AWS::EC2::*`,
@@ -107,7 +107,7 @@ module Aws::CloudFormation
107
107
  #
108
108
  #
109
109
  #
110
- # [1]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
110
+ # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
111
111
  # @return [Types::StackResourceDriftInformation]
112
112
  def drift_information
113
113
  data[:drift_information]
@@ -83,7 +83,7 @@ module Aws::CloudFormation
83
83
  #
84
84
  #
85
85
  #
86
- # [1]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
86
+ # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
87
87
  # @return [Types::StackResourceDriftInformationSummary]
88
88
  def drift_information
89
89
  data[:drift_information]
@@ -393,30 +393,78 @@ module Aws::CloudFormation
393
393
  # @return [Array<Types::Parameter>]
394
394
  #
395
395
  # @!attribute [rw] capabilities
396
- # A list of values that you must specify before AWS CloudFormation can
397
- # update certain stacks. Some stack templates might include resources
398
- # that can affect permissions in your AWS account, for example, by
399
- # creating new AWS Identity and Access Management (IAM) users. For
400
- # those stacks, you must explicitly acknowledge their capabilities by
401
- # specifying this parameter.
402
- #
403
- # The only valid values are `CAPABILITY_IAM` and
404
- # `CAPABILITY_NAMED_IAM`. The following resources require you to
405
- # specify this parameter: [ AWS::IAM::AccessKey][1], [
406
- # AWS::IAM::Group][2], [ AWS::IAM::InstanceProfile][3], [
407
- # AWS::IAM::Policy][4], [ AWS::IAM::Role][5], [ AWS::IAM::User][6],
408
- # and [ AWS::IAM::UserToGroupAddition][7]. If your stack template
409
- # contains these resources, we recommend that you review all
410
- # permissions associated with them and edit their permissions if
411
- # necessary.
412
- #
413
- # If you have IAM resources, you can specify either capability. If you
414
- # have IAM resources with custom names, you must specify
415
- # `CAPABILITY_NAMED_IAM`. If you don't specify this parameter, this
416
- # action returns an `InsufficientCapabilities` error.
396
+ # In some cases, you must explicity acknowledge that your stack
397
+ # template contains certain capabilities in order for AWS
398
+ # CloudFormation to create the stack.
417
399
  #
418
- # For more information, see [Acknowledging IAM Resources in AWS
419
- # CloudFormation Templates][8].
400
+ # * `CAPABILITY_IAM` and `CAPABILITY_NAMED_IAM`
401
+ #
402
+ # Some stack templates might include resources that can affect
403
+ # permissions in your AWS account; for example, by creating new AWS
404
+ # Identity and Access Management (IAM) users. For those stacks, you
405
+ # must explicitly acknowledge this by specifying one of these
406
+ # capabilities.
407
+ #
408
+ # The following IAM resources require you to specify either the
409
+ # `CAPABILITY_IAM` or `CAPABILITY_NAMED_IAM` capability.
410
+ #
411
+ # * If you have IAM resources, you can specify either capability.
412
+ #
413
+ # * If you have IAM resources with custom names, you *must* specify
414
+ # `CAPABILITY_NAMED_IAM`.
415
+ #
416
+ # * If you don't specify either of these capabilities, AWS
417
+ # CloudFormation returns an `InsufficientCapabilities` error.
418
+ #
419
+ # If your stack template contains these resources, we recommend that
420
+ # you review all permissions associated with them and edit their
421
+ # permissions if necessary.
422
+ #
423
+ # * [ AWS::IAM::AccessKey][1]
424
+ #
425
+ # * [ AWS::IAM::Group][2]
426
+ #
427
+ # * [ AWS::IAM::InstanceProfile][3]
428
+ #
429
+ # * [ AWS::IAM::Policy][4]
430
+ #
431
+ # * [ AWS::IAM::Role][5]
432
+ #
433
+ # * [ AWS::IAM::User][6]
434
+ #
435
+ # * [ AWS::IAM::UserToGroupAddition][7]
436
+ #
437
+ # For more information, see [Acknowledging IAM Resources in AWS
438
+ # CloudFormation Templates][8].
439
+ #
440
+ # * `CAPABILITY_AUTO_EXPAND`
441
+ #
442
+ # Some template contain macros. Macros perform custom processing on
443
+ # templates; this can include simple actions like find-and-replace
444
+ # operations, all the way to extensive transformations of entire
445
+ # templates. Because of this, users typically create a change set
446
+ # from the processed template, so that they can review the changes
447
+ # resulting from the macros before actually creating the stack. If
448
+ # your stack template contains one or more macros, and you choose to
449
+ # create a stack directly from the processed template, without first
450
+ # reviewing the resulting changes in a change set, you must
451
+ # acknowledge this capability. This includes the [AWS::Include][9]
452
+ # and [AWS::Serverless][10] transforms, which are macros hosted by
453
+ # AWS CloudFormation.
454
+ #
455
+ # <note markdown="1"> This capacity does not apply to creating change sets, and
456
+ # specifying it when creating change sets has no effect.
457
+ #
458
+ # Also, change sets do not currently support nested stacks. If you
459
+ # want to create a stack from a stack template that contains macros
460
+ # *and* nested stacks, you must create or update the stack directly
461
+ # from the template using the CreateStack or UpdateStack action, and
462
+ # specifying this capability.
463
+ #
464
+ # </note>
465
+ #
466
+ # For more information on macros, see [Using AWS CloudFormation
467
+ # Macros to Perform Custom Processing on Templates][11].
420
468
  #
421
469
  #
422
470
  #
@@ -428,6 +476,9 @@ module Aws::CloudFormation
428
476
  # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
429
477
  # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
430
478
  # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
479
+ # [9]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
480
+ # [10]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
481
+ # [11]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
431
482
  # @return [Array<String>]
432
483
  #
433
484
  # @!attribute [rw] resource_types
@@ -765,10 +816,10 @@ module Aws::CloudFormation
765
816
  # [5]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html
766
817
  # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
767
818
  # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
768
- # [8]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
769
- # [9]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
770
- # [10]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
771
- # [11]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
819
+ # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
820
+ # [9]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
821
+ # [10]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
822
+ # [11]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
772
823
  # @return [Array<String>]
773
824
  #
774
825
  # @!attribute [rw] resource_types
@@ -1122,46 +1173,80 @@ module Aws::CloudFormation
1122
1173
  # @return [Array<Types::Parameter>]
1123
1174
  #
1124
1175
  # @!attribute [rw] capabilities
1125
- # A list of values that you must specify before AWS CloudFormation can
1126
- # create certain stack sets. Some stack set templates might include
1127
- # resources that can affect permissions in your AWS account—for
1128
- # example, by creating new AWS Identity and Access Management (IAM)
1129
- # users. For those stack sets, you must explicitly acknowledge their
1130
- # capabilities by specifying this parameter.
1176
+ # In some cases, you must explicity acknowledge that your stack set
1177
+ # template contains certain capabilities in order for AWS
1178
+ # CloudFormation to create the stack set and related stack instances.
1131
1179
  #
1132
- # The only valid values are CAPABILITY\_IAM and
1133
- # CAPABILITY\_NAMED\_IAM. The following resources require you to
1134
- # specify this parameter:
1180
+ # * `CAPABILITY_IAM` and `CAPABILITY_NAMED_IAM`
1135
1181
  #
1136
- # * AWS::IAM::AccessKey
1182
+ # Some stack templates might include resources that can affect
1183
+ # permissions in your AWS account; for example, by creating new AWS
1184
+ # Identity and Access Management (IAM) users. For those stack sets,
1185
+ # you must explicitly acknowledge this by specifying one of these
1186
+ # capabilities.
1137
1187
  #
1138
- # * AWS::IAM::Group
1188
+ # The following IAM resources require you to specify either the
1189
+ # `CAPABILITY_IAM` or `CAPABILITY_NAMED_IAM` capability.
1139
1190
  #
1140
- # * AWS::IAM::InstanceProfile
1191
+ # * If you have IAM resources, you can specify either capability.
1141
1192
  #
1142
- # * AWS::IAM::Policy
1193
+ # * If you have IAM resources with custom names, you *must* specify
1194
+ # `CAPABILITY_NAMED_IAM`.
1143
1195
  #
1144
- # * AWS::IAM::Role
1196
+ # * If you don't specify either of these capabilities, AWS
1197
+ # CloudFormation returns an `InsufficientCapabilities` error.
1145
1198
  #
1146
- # * AWS::IAM::User
1199
+ # If your stack template contains these resources, we recommend that
1200
+ # you review all permissions associated with them and edit their
1201
+ # permissions if necessary.
1147
1202
  #
1148
- # * AWS::IAM::UserToGroupAddition
1203
+ # * [ AWS::IAM::AccessKey][1]
1149
1204
  #
1150
- # If your stack template contains these resources, we recommend that
1151
- # you review all permissions that are associated with them and edit
1152
- # their permissions if necessary.
1205
+ # * [ AWS::IAM::Group][2]
1153
1206
  #
1154
- # If you have IAM resources, you can specify either capability. If you
1155
- # have IAM resources with custom names, you must specify
1156
- # CAPABILITY\_NAMED\_IAM. If you don't specify this parameter, this
1157
- # action returns an `InsufficientCapabilities` error.
1207
+ # * [ AWS::IAM::InstanceProfile][3]
1158
1208
  #
1159
- # For more information, see [Acknowledging IAM Resources in AWS
1160
- # CloudFormation Templates.][1]
1209
+ # * [ AWS::IAM::Policy][4]
1161
1210
  #
1211
+ # * [ AWS::IAM::Role][5]
1162
1212
  #
1213
+ # * [ AWS::IAM::User][6]
1163
1214
  #
1164
- # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
1215
+ # * [ AWS::IAM::UserToGroupAddition][7]
1216
+ #
1217
+ # For more information, see [Acknowledging IAM Resources in AWS
1218
+ # CloudFormation Templates][8].
1219
+ #
1220
+ # * `CAPABILITY_AUTO_EXPAND`
1221
+ #
1222
+ # Some templates contain macros. If your stack template contains one
1223
+ # or more macros, and you choose to create a stack directly from the
1224
+ # processed template, without first reviewing the resulting changes
1225
+ # in a change set, you must acknowledge this capability. For more
1226
+ # information, see [Using AWS CloudFormation Macros to Perform
1227
+ # Custom Processing on Templates][9].
1228
+ #
1229
+ # <note markdown="1"> Stack sets do not currently support macros in stack templates.
1230
+ # (This includes the [AWS::Include][10] and [AWS::Serverless][11]
1231
+ # transforms, which are macros hosted by AWS CloudFormation.) Even
1232
+ # if you specify this capability, if you include a macro in your
1233
+ # template the stack set operation will fail.
1234
+ #
1235
+ # </note>
1236
+ #
1237
+ #
1238
+ #
1239
+ # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-accesskey.html
1240
+ # [2]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-group.html
1241
+ # [3]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-instanceprofile.html
1242
+ # [4]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-policy.html
1243
+ # [5]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html
1244
+ # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
1245
+ # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
1246
+ # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
1247
+ # [9]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
1248
+ # [10]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
1249
+ # [11]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
1165
1250
  # @return [Array<String>]
1166
1251
  #
1167
1252
  # @!attribute [rw] tags
@@ -3880,7 +3965,7 @@ module Aws::CloudFormation
3880
3965
  #
3881
3966
  #
3882
3967
  #
3883
- # [1]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
3968
+ # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
3884
3969
  # @return [Types::StackDriftInformation]
3885
3970
  #
3886
3971
  # @see http://docs.aws.amazon.com/goto/WebAPI/cloudformation-2010-05-15/Stack AWS API Documentation
@@ -4259,7 +4344,7 @@ module Aws::CloudFormation
4259
4344
  #
4260
4345
  #
4261
4346
  #
4262
- # [1]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
4347
+ # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
4263
4348
  # @return [Types::StackResourceDriftInformation]
4264
4349
  #
4265
4350
  # @see http://docs.aws.amazon.com/goto/WebAPI/cloudformation-2010-05-15/StackResource AWS API Documentation
@@ -4341,7 +4426,7 @@ module Aws::CloudFormation
4341
4426
  #
4342
4427
  #
4343
4428
  #
4344
- # [1]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
4429
+ # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
4345
4430
  # @return [Types::StackResourceDriftInformation]
4346
4431
  #
4347
4432
  # @see http://docs.aws.amazon.com/goto/WebAPI/cloudformation-2010-05-15/StackResourceDetail AWS API Documentation
@@ -4379,7 +4464,7 @@ module Aws::CloudFormation
4379
4464
  #
4380
4465
  #
4381
4466
  # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
4382
- # [2]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift-resource-list.html
4467
+ # [2]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift-resource-list.html
4383
4468
  #
4384
4469
  # @!attribute [rw] stack_id
4385
4470
  # The ID of the stack.
@@ -4597,7 +4682,7 @@ module Aws::CloudFormation
4597
4682
  #
4598
4683
  #
4599
4684
  #
4600
- # [1]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
4685
+ # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
4601
4686
  # @return [Types::StackResourceDriftInformationSummary]
4602
4687
  #
4603
4688
  # @see http://docs.aws.amazon.com/goto/WebAPI/cloudformation-2010-05-15/StackResourceSummary AWS API Documentation
@@ -5134,7 +5219,7 @@ module Aws::CloudFormation
5134
5219
  #
5135
5220
  #
5136
5221
  #
5137
- # [1]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
5222
+ # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-stack-drift.html
5138
5223
  # @return [Types::StackDriftInformationSummary]
5139
5224
  #
5140
5225
  # @see http://docs.aws.amazon.com/goto/WebAPI/cloudformation-2010-05-15/StackSummary AWS API Documentation
@@ -5446,10 +5531,10 @@ module Aws::CloudFormation
5446
5531
  # [5]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html
5447
5532
  # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
5448
5533
  # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
5449
- # [8]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
5450
- # [9]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
5451
- # [10]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
5452
- # [11]: http://docs.aws.amazon.com/http:/docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
5534
+ # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
5535
+ # [9]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
5536
+ # [10]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
5537
+ # [11]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
5453
5538
  # @return [Array<String>]
5454
5539
  #
5455
5540
  # @!attribute [rw] resource_types
@@ -5812,46 +5897,79 @@ module Aws::CloudFormation
5812
5897
  # @return [Array<Types::Parameter>]
5813
5898
  #
5814
5899
  # @!attribute [rw] capabilities
5815
- # A list of values that you must specify before AWS CloudFormation can
5816
- # create certain stack sets. Some stack set templates might include
5817
- # resources that can affect permissions in your AWS account—for
5818
- # example, by creating new AWS Identity and Access Management (IAM)
5819
- # users. For those stack sets, you must explicitly acknowledge their
5820
- # capabilities by specifying this parameter.
5900
+ # In some cases, you must explicity acknowledge that your stack
5901
+ # template contains certain capabilities in order for AWS
5902
+ # CloudFormation to update the stack set and its associated stack
5903
+ # instances.
5821
5904
  #
5822
- # The only valid values are CAPABILITY\_IAM and
5823
- # CAPABILITY\_NAMED\_IAM. The following resources require you to
5824
- # specify this parameter:
5905
+ # * `CAPABILITY_IAM` and `CAPABILITY_NAMED_IAM`
5825
5906
  #
5826
- # * AWS::IAM::AccessKey
5907
+ # Some stack templates might include resources that can affect
5908
+ # permissions in your AWS account; for example, by creating new AWS
5909
+ # Identity and Access Management (IAM) users. For those stacks sets,
5910
+ # you must explicitly acknowledge this by specifying one of these
5911
+ # capabilities.
5827
5912
  #
5828
- # * AWS::IAM::Group
5913
+ # The following IAM resources require you to specify either the
5914
+ # `CAPABILITY_IAM` or `CAPABILITY_NAMED_IAM` capability.
5829
5915
  #
5830
- # * AWS::IAM::InstanceProfile
5916
+ # * If you have IAM resources, you can specify either capability.
5831
5917
  #
5832
- # * AWS::IAM::Policy
5918
+ # * If you have IAM resources with custom names, you *must* specify
5919
+ # `CAPABILITY_NAMED_IAM`.
5833
5920
  #
5834
- # * AWS::IAM::Role
5921
+ # * If you don't specify either of these capabilities, AWS
5922
+ # CloudFormation returns an `InsufficientCapabilities` error.
5835
5923
  #
5836
- # * AWS::IAM::User
5924
+ # If your stack template contains these resources, we recommend that
5925
+ # you review all permissions associated with them and edit their
5926
+ # permissions if necessary.
5837
5927
  #
5838
- # * AWS::IAM::UserToGroupAddition
5928
+ # * [ AWS::IAM::AccessKey][1]
5839
5929
  #
5840
- # If your stack template contains these resources, we recommend that
5841
- # you review all permissions that are associated with them and edit
5842
- # their permissions if necessary.
5930
+ # * [ AWS::IAM::Group][2]
5843
5931
  #
5844
- # If you have IAM resources, you can specify either capability. If you
5845
- # have IAM resources with custom names, you must specify
5846
- # CAPABILITY\_NAMED\_IAM. If you don't specify this parameter, this
5847
- # action returns an `InsufficientCapabilities` error.
5932
+ # * [ AWS::IAM::InstanceProfile][3]
5848
5933
  #
5849
- # For more information, see [Acknowledging IAM Resources in AWS
5850
- # CloudFormation Templates.][1]
5934
+ # * [ AWS::IAM::Policy][4]
5851
5935
  #
5936
+ # * [ AWS::IAM::Role][5]
5852
5937
  #
5938
+ # * [ AWS::IAM::User][6]
5853
5939
  #
5854
- # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
5940
+ # * [ AWS::IAM::UserToGroupAddition][7]
5941
+ #
5942
+ # For more information, see [Acknowledging IAM Resources in AWS
5943
+ # CloudFormation Templates][8].
5944
+ #
5945
+ # * `CAPABILITY_AUTO_EXPAND`
5946
+ #
5947
+ # Some templates contain macros. If your stack template contains one
5948
+ # or more macros, and you choose to update a stack directly from the
5949
+ # processed template, without first reviewing the resulting changes
5950
+ # in a change set, you must acknowledge this capability. For more
5951
+ # information, see [Using AWS CloudFormation Macros to Perform
5952
+ # Custom Processing on Templates][9].
5953
+ #
5954
+ # Stack sets do not currently support macros in stack templates.
5955
+ # (This includes the [AWS::Include][10] and [AWS::Serverless][11]
5956
+ # transforms, which are macros hosted by AWS CloudFormation.) Even
5957
+ # if you specify this capability, if you include a macro in your
5958
+ # template the stack set operation will fail.
5959
+ #
5960
+ #
5961
+ #
5962
+ # [1]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-accesskey.html
5963
+ # [2]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-group.html
5964
+ # [3]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-instanceprofile.html
5965
+ # [4]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-policy.html
5966
+ # [5]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html
5967
+ # [6]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html
5968
+ # [7]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html
5969
+ # [8]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities
5970
+ # [9]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html
5971
+ # [10]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html
5972
+ # [11]: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html
5855
5973
  # @return [Array<String>]
5856
5974
  #
5857
5975
  # @!attribute [rw] tags
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-cloudformation
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.13.0
4
+ version: 1.14.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2018-11-20 00:00:00.000000000 Z
11
+ date: 2018-12-14 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core