@awboost/cfn-resource-types 0.1.21 → 0.1.23
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/AWS-AppSync-ApiCache.d.ts +1 -0
- package/lib/AWS-AppSync-DataSource.d.ts +1 -0
- package/lib/AWS-AppSync-GraphQLApi.d.ts +10 -0
- package/lib/AWS-AppSync-Resolver.d.ts +1 -0
- package/lib/AWS-Batch-JobDefinition.d.ts +8 -0
- package/lib/AWS-CodePipeline-Pipeline.d.ts +29 -0
- package/lib/AWS-Cognito-UserPoolRiskConfigurationAttachment.d.ts +1 -8
- package/lib/AWS-ControlTower-EnabledBaseline.d.ts +80 -0
- package/lib/AWS-ControlTower-EnabledBaseline.js +12 -0
- package/lib/AWS-DynamoDB-Table.d.ts +9 -0
- package/lib/AWS-EC2-InstanceConnectEndpoint.d.ts +1 -1
- package/lib/AWS-EC2-NatGateway.d.ts +46 -4
- package/lib/AWS-EC2-NatGateway.js +5 -1
- package/lib/AWS-EC2-PrefixList.d.ts +1 -1
- package/lib/AWS-EC2-Subnet.d.ts +6 -0
- package/lib/AWS-EC2-SubnetRouteTableAssociation.d.ts +11 -2
- package/lib/AWS-EC2-SubnetRouteTableAssociation.js +2 -1
- package/lib/AWS-EC2-VPC.d.ts +30 -31
- package/lib/AWS-EC2-VPC.js +4 -1
- package/lib/AWS-ECS-TaskDefinition.d.ts +641 -25
- package/lib/AWS-ECS-TaskDefinition.js +3 -1
- package/lib/AWS-EMR-Cluster.d.ts +1 -0
- package/lib/AWS-GuardDuty-Master.d.ts +14 -9
- package/lib/AWS-GuardDuty-Master.js +2 -1
- package/lib/AWS-IAM-User.d.ts +43 -25
- package/lib/AWS-IAM-User.js +3 -1
- package/lib/AWS-IoTWireless-WirelessDevice.d.ts +34 -0
- package/lib/AWS-KMS-Alias.d.ts +25 -11
- package/lib/AWS-KMS-Alias.js +3 -1
- package/lib/AWS-KMS-Key.d.ts +62 -28
- package/lib/AWS-KMS-Key.js +3 -1
- package/lib/AWS-Route53-RecordSet.d.ts +19 -0
- package/lib/AWS-Route53-RecordSetGroup.d.ts +19 -0
- package/lib/AWS-S3-Bucket.d.ts +381 -139
- package/lib/AWS-S3-Bucket.js +3 -1
- package/lib/AWS-S3-BucketPolicy.d.ts +15 -3
- package/lib/AWS-S3-BucketPolicy.js +7 -1
- package/lib/AWS-SageMaker-AppImageConfig.d.ts +1 -1
- package/package.json +1 -1
package/lib/AWS-S3-Bucket.js
CHANGED
|
@@ -1,6 +1,8 @@
|
|
|
1
1
|
import { Resource as $Resource } from "@awboost/cfn-template-builder/template/resource";
|
|
2
2
|
/**
|
|
3
|
-
*
|
|
3
|
+
* The ``AWS::S3::Bucket`` resource creates an Amazon S3 bucket in the same AWS Region where you create the AWS CloudFormation stack.
|
|
4
|
+
To control how AWS CloudFormation handles the bucket when the stack is deleted, you can set a deletion policy for your bucket. You can choose to *retain* the bucket or to *delete* the bucket. For more information, see [DeletionPolicy Attribute](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-attribute-deletionpolicy.html).
|
|
5
|
+
You can only delete empty buckets. Deletion fails for buckets that have contents.
|
|
4
6
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-s3-bucket.html}
|
|
5
7
|
*/
|
|
6
8
|
export class S3Bucket extends $Resource {
|
|
@@ -1,7 +1,13 @@
|
|
|
1
1
|
import { Resource as $Resource } from "@awboost/cfn-template-builder/template/resource";
|
|
2
2
|
import type { ResourceOptions as $ResourceOptions } from "@awboost/cfn-template-builder/template";
|
|
3
3
|
/**
|
|
4
|
-
* Resource
|
|
4
|
+
* Resource type definition for `AWS::S3::BucketPolicy`.
|
|
5
|
+
* Applies an Amazon S3 bucket policy to an Amazon S3 bucket. If you are using an identity other than the root user of the AWS-account that owns the bucket, the calling identity must have the ``PutBucketPolicy`` permissions on the specified bucket and belong to the bucket owner's account in order to use this operation.
|
|
6
|
+
If you don't have ``PutBucketPolicy`` permissions, Amazon S3 returns a ``403 Access Denied`` error. If you have the correct permissions, but you're not using an identity that belongs to the bucket owner's account, Amazon S3 returns a ``405 Method Not Allowed`` error.
|
|
7
|
+
As a security precaution, the root user of the AWS-account that owns a bucket can always use this operation, even if the policy explicitly denies the root user the ability to perform this action.
|
|
8
|
+
For more information, see [Bucket policy examples](https://docs.aws.amazon.com/AmazonS3/latest/userguide/example-bucket-policies.html).
|
|
9
|
+
The following operations are related to ``PutBucketPolicy``:
|
|
10
|
+
+ [Create
|
|
5
11
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-s3-bucketpolicy.html}
|
|
6
12
|
*/
|
|
7
13
|
export type S3BucketPolicyProperties = {
|
|
@@ -10,12 +16,18 @@ export type S3BucketPolicyProperties = {
|
|
|
10
16
|
*/
|
|
11
17
|
Bucket: string;
|
|
12
18
|
/**
|
|
13
|
-
* A policy document containing permissions to add to the specified bucket. In IAM, you must provide policy documents in JSON format. However, in CloudFormation you can provide the policy in JSON or YAML format because CloudFormation converts YAML to JSON before submitting it to IAM.
|
|
19
|
+
* A policy document containing permissions to add to the specified bucket. In IAM, you must provide policy documents in JSON format. However, in CloudFormation you can provide the policy in JSON or YAML format because CloudFormation converts YAML to JSON before submitting it to IAM. For more information, see the AWS::IAM::Policy [PolicyDocument](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-policy.html#cfn-iam-policy-policydocument) resource description in this guide and [Access Policy Language Overview](https://docs.aws.amazon.com/AmazonS3/latest/dev/access-policy-language-overview.html) in the *Amazon S3 User Guide*.
|
|
14
20
|
*/
|
|
15
21
|
PolicyDocument: Record<string, any> | string;
|
|
16
22
|
};
|
|
17
23
|
/**
|
|
18
|
-
* Resource
|
|
24
|
+
* Resource type definition for `AWS::S3::BucketPolicy`.
|
|
25
|
+
* Applies an Amazon S3 bucket policy to an Amazon S3 bucket. If you are using an identity other than the root user of the AWS-account that owns the bucket, the calling identity must have the ``PutBucketPolicy`` permissions on the specified bucket and belong to the bucket owner's account in order to use this operation.
|
|
26
|
+
If you don't have ``PutBucketPolicy`` permissions, Amazon S3 returns a ``403 Access Denied`` error. If you have the correct permissions, but you're not using an identity that belongs to the bucket owner's account, Amazon S3 returns a ``405 Method Not Allowed`` error.
|
|
27
|
+
As a security precaution, the root user of the AWS-account that owns a bucket can always use this operation, even if the policy explicitly denies the root user the ability to perform this action.
|
|
28
|
+
For more information, see [Bucket policy examples](https://docs.aws.amazon.com/AmazonS3/latest/userguide/example-bucket-policies.html).
|
|
29
|
+
The following operations are related to ``PutBucketPolicy``:
|
|
30
|
+
+ [Create
|
|
19
31
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-s3-bucketpolicy.html}
|
|
20
32
|
*/
|
|
21
33
|
export declare class S3BucketPolicy extends $Resource<"AWS::S3::BucketPolicy", S3BucketPolicyProperties, Record<string, never>> {
|
|
@@ -1,6 +1,12 @@
|
|
|
1
1
|
import { Resource as $Resource } from "@awboost/cfn-template-builder/template/resource";
|
|
2
2
|
/**
|
|
3
|
-
* Resource
|
|
3
|
+
* Resource type definition for `AWS::S3::BucketPolicy`.
|
|
4
|
+
* Applies an Amazon S3 bucket policy to an Amazon S3 bucket. If you are using an identity other than the root user of the AWS-account that owns the bucket, the calling identity must have the ``PutBucketPolicy`` permissions on the specified bucket and belong to the bucket owner's account in order to use this operation.
|
|
5
|
+
If you don't have ``PutBucketPolicy`` permissions, Amazon S3 returns a ``403 Access Denied`` error. If you have the correct permissions, but you're not using an identity that belongs to the bucket owner's account, Amazon S3 returns a ``405 Method Not Allowed`` error.
|
|
6
|
+
As a security precaution, the root user of the AWS-account that owns a bucket can always use this operation, even if the policy explicitly denies the root user the ability to perform this action.
|
|
7
|
+
For more information, see [Bucket policy examples](https://docs.aws.amazon.com/AmazonS3/latest/userguide/example-bucket-policies.html).
|
|
8
|
+
The following operations are related to ``PutBucketPolicy``:
|
|
9
|
+
+ [Create
|
|
4
10
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-s3-bucketpolicy.html}
|
|
5
11
|
*/
|
|
6
12
|
export class S3BucketPolicy extends $Resource {
|
|
@@ -111,7 +111,7 @@ export type FileSystemConfig = {
|
|
|
111
111
|
};
|
|
112
112
|
/**
|
|
113
113
|
* Type definition for `AWS::SageMaker::AppImageConfig.JupyterLabAppImageConfig`.
|
|
114
|
-
* The configuration for the
|
|
114
|
+
* The configuration for the kernels in a SageMaker image running as a JupyterLab app.
|
|
115
115
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-sagemaker-appimageconfig-jupyterlabappimageconfig.html}
|
|
116
116
|
*/
|
|
117
117
|
export type JupyterLabAppImageConfig = {
|